Feb 12 19:18:31.071876 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:18:31.071897 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:18:31.071909 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:18:31.071916 kernel: printk: bootconsole [pl11] enabled Feb 12 19:18:31.071921 kernel: efi: EFI v2.70 by EDK II Feb 12 19:18:31.071927 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:18:31.071934 kernel: random: crng init done Feb 12 19:18:31.071939 kernel: ACPI: Early table checksum verification disabled Feb 12 19:18:31.071945 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:18:31.071950 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071956 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071962 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:18:31.071968 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071974 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071980 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071987 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.071993 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.072000 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.072005 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:18:31.072011 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:31.072017 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:18:31.072022 kernel: NUMA: Failed to initialise from firmware Feb 12 19:18:31.072028 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:18:31.072034 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 12 19:18:31.072039 kernel: Zone ranges: Feb 12 19:18:31.072045 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:18:31.072050 kernel: DMA32 empty Feb 12 19:18:31.072057 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:18:31.072063 kernel: Movable zone start for each node Feb 12 19:18:31.072069 kernel: Early memory node ranges Feb 12 19:18:31.072074 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:18:31.072080 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:18:31.072085 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:18:31.072091 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:18:31.072097 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:18:31.072102 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:18:31.072119 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:18:31.072125 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:18:31.072131 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:18:31.072138 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:18:31.072146 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:18:31.072153 kernel: psci: probing for conduit method from ACPI. Feb 12 19:18:31.072159 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:18:31.072165 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:18:31.072172 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:18:31.072178 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:18:31.072184 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:18:31.072190 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:18:31.072196 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:18:31.072202 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:18:31.072208 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:18:31.072221 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:18:31.072228 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:18:31.072234 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:18:31.072240 kernel: CPU features: detected: Spectre-BHB Feb 12 19:18:31.072246 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:18:31.072253 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:18:31.072260 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:18:31.072266 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:18:31.072272 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:18:31.072278 kernel: Policy zone: Normal Feb 12 19:18:31.072285 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:18:31.072292 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:18:31.072298 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:18:31.072304 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:18:31.072310 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:18:31.072318 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:18:31.072324 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 12 19:18:31.072330 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:18:31.072336 kernel: trace event string verifier disabled Feb 12 19:18:31.072342 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:18:31.072348 kernel: rcu: RCU event tracing is enabled. Feb 12 19:18:31.072355 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:18:31.072361 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:18:31.072367 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:18:31.072373 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:18:31.072379 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:18:31.072386 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:18:31.072392 kernel: GICv3: 960 SPIs implemented Feb 12 19:18:31.072460 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:18:31.072470 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:18:31.072476 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:18:31.072482 kernel: GICv3: 16 PPIs implemented Feb 12 19:18:31.072488 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:18:31.072495 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:18:31.072501 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:18:31.072507 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:18:31.072513 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:18:31.072529 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:18:31.072537 kernel: Console: colour dummy device 80x25 Feb 12 19:18:31.072544 kernel: printk: console [tty1] enabled Feb 12 19:18:31.072550 kernel: ACPI: Core revision 20210730 Feb 12 19:18:31.072557 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:18:31.072563 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:18:31.085419 kernel: LSM: Security Framework initializing Feb 12 19:18:31.085458 kernel: SELinux: Initializing. Feb 12 19:18:31.085466 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:18:31.085473 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:18:31.085487 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:18:31.085494 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:18:31.085501 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:18:31.085508 kernel: Remapping and enabling EFI services. Feb 12 19:18:31.085515 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:18:31.085521 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:18:31.085528 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:18:31.085534 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:18:31.085541 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:18:31.085549 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:18:31.085555 kernel: SMP: Total of 2 processors activated. Feb 12 19:18:31.085563 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:18:31.085581 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:18:31.085590 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:18:31.085596 kernel: CPU features: detected: CRC32 instructions Feb 12 19:18:31.085603 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:18:31.085609 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:18:31.085615 kernel: CPU features: detected: Privileged Access Never Feb 12 19:18:31.085624 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:18:31.085630 kernel: alternatives: patching kernel code Feb 12 19:18:31.085642 kernel: devtmpfs: initialized Feb 12 19:18:31.085650 kernel: KASLR enabled Feb 12 19:18:31.085657 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:18:31.085664 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:18:31.085671 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:18:31.085678 kernel: SMBIOS 3.1.0 present. Feb 12 19:18:31.085686 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:18:31.085693 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:18:31.085702 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:18:31.085710 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:18:31.085718 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:18:31.085725 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:18:31.085734 kernel: audit: type=2000 audit(0.096:1): state=initialized audit_enabled=0 res=1 Feb 12 19:18:31.085742 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:18:31.085749 kernel: cpuidle: using governor menu Feb 12 19:18:31.085757 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:18:31.085765 kernel: ASID allocator initialised with 32768 entries Feb 12 19:18:31.085772 kernel: ACPI: bus type PCI registered Feb 12 19:18:31.085780 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:18:31.085788 kernel: Serial: AMBA PL011 UART driver Feb 12 19:18:31.085796 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:18:31.085803 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:18:31.085811 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:18:31.085819 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:18:31.085828 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:18:31.085836 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:18:31.085844 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:18:31.085852 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:18:31.085859 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:18:31.085865 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:18:31.085872 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:18:31.085879 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:18:31.085885 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:18:31.085894 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:18:31.085901 kernel: ACPI: Interpreter enabled Feb 12 19:18:31.085907 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:18:31.085914 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:18:31.085921 kernel: printk: console [ttyAMA0] enabled Feb 12 19:18:31.085928 kernel: printk: bootconsole [pl11] disabled Feb 12 19:18:31.085936 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:18:31.085943 kernel: iommu: Default domain type: Translated Feb 12 19:18:31.085951 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:18:31.085960 kernel: vgaarb: loaded Feb 12 19:18:31.085969 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:18:31.085977 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:18:31.085985 kernel: PTP clock support registered Feb 12 19:18:31.085992 kernel: Registered efivars operations Feb 12 19:18:31.085999 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:18:31.086007 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:18:31.086015 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:18:31.086023 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:18:31.086032 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:18:31.086038 kernel: pnp: PnP ACPI init Feb 12 19:18:31.086045 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:18:31.086052 kernel: NET: Registered PF_INET protocol family Feb 12 19:18:31.086058 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:18:31.086065 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:18:31.086072 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:18:31.086081 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:18:31.086089 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:18:31.086097 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:18:31.086103 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:18:31.086110 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:18:31.086117 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:18:31.086123 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:18:31.086130 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:18:31.086137 kernel: kvm [1]: HYP mode not available Feb 12 19:18:31.086144 kernel: Initialise system trusted keyrings Feb 12 19:18:31.086150 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:18:31.086159 kernel: Key type asymmetric registered Feb 12 19:18:31.086165 kernel: Asymmetric key parser 'x509' registered Feb 12 19:18:31.086172 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:18:31.086178 kernel: io scheduler mq-deadline registered Feb 12 19:18:31.086185 kernel: io scheduler kyber registered Feb 12 19:18:31.086192 kernel: io scheduler bfq registered Feb 12 19:18:31.086198 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:18:31.086205 kernel: thunder_xcv, ver 1.0 Feb 12 19:18:31.086211 kernel: thunder_bgx, ver 1.0 Feb 12 19:18:31.086219 kernel: nicpf, ver 1.0 Feb 12 19:18:31.086226 kernel: nicvf, ver 1.0 Feb 12 19:18:31.086373 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:18:31.086438 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:18:30 UTC (1707765510) Feb 12 19:18:31.086447 kernel: efifb: probing for efifb Feb 12 19:18:31.086454 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:18:31.086461 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:18:31.086468 kernel: efifb: scrolling: redraw Feb 12 19:18:31.086477 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:18:31.086484 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:18:31.086491 kernel: fb0: EFI VGA frame buffer device Feb 12 19:18:31.086498 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:18:31.086504 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:18:31.086511 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:18:31.086518 kernel: Segment Routing with IPv6 Feb 12 19:18:31.086524 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:18:31.086531 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:18:31.086539 kernel: Key type dns_resolver registered Feb 12 19:18:31.086546 kernel: registered taskstats version 1 Feb 12 19:18:31.086553 kernel: Loading compiled-in X.509 certificates Feb 12 19:18:31.086560 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:18:31.086566 kernel: Key type .fscrypt registered Feb 12 19:18:31.086594 kernel: Key type fscrypt-provisioning registered Feb 12 19:18:31.086601 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:18:31.086608 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:18:31.086615 kernel: ima: No architecture policies found Feb 12 19:18:31.086624 kernel: Freeing unused kernel memory: 34688K Feb 12 19:18:31.086630 kernel: Run /init as init process Feb 12 19:18:31.086637 kernel: with arguments: Feb 12 19:18:31.086644 kernel: /init Feb 12 19:18:31.086650 kernel: with environment: Feb 12 19:18:31.086657 kernel: HOME=/ Feb 12 19:18:31.086663 kernel: TERM=linux Feb 12 19:18:31.086670 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:18:31.086679 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:18:31.086690 systemd[1]: Detected virtualization microsoft. Feb 12 19:18:31.086697 systemd[1]: Detected architecture arm64. Feb 12 19:18:31.086705 systemd[1]: Running in initrd. Feb 12 19:18:31.086712 systemd[1]: No hostname configured, using default hostname. Feb 12 19:18:31.086719 systemd[1]: Hostname set to . Feb 12 19:18:31.086726 systemd[1]: Initializing machine ID from random generator. Feb 12 19:18:31.086733 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:18:31.086742 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:18:31.086749 systemd[1]: Reached target cryptsetup.target. Feb 12 19:18:31.086756 systemd[1]: Reached target paths.target. Feb 12 19:18:31.086763 systemd[1]: Reached target slices.target. Feb 12 19:18:31.086770 systemd[1]: Reached target swap.target. Feb 12 19:18:31.086777 systemd[1]: Reached target timers.target. Feb 12 19:18:31.086785 systemd[1]: Listening on iscsid.socket. Feb 12 19:18:31.086792 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:18:31.086800 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:18:31.086808 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:18:31.086815 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:18:31.086822 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:18:31.086829 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:18:31.086836 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:18:31.086843 systemd[1]: Reached target sockets.target. Feb 12 19:18:31.086850 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:18:31.086858 systemd[1]: Finished network-cleanup.service. Feb 12 19:18:31.086866 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:18:31.086873 systemd[1]: Starting systemd-journald.service... Feb 12 19:18:31.086880 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:18:31.086888 systemd[1]: Starting systemd-resolved.service... Feb 12 19:18:31.086895 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:18:31.086907 systemd-journald[276]: Journal started Feb 12 19:18:31.086953 systemd-journald[276]: Runtime Journal (/run/log/journal/b24193c9b7e74787a980db32426f5437) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:18:31.072610 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:18:31.108219 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:18:31.118061 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:18:31.124684 kernel: Bridge firewalling registered Feb 12 19:18:31.124706 systemd[1]: Started systemd-journald.service. Feb 12 19:18:31.143607 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:18:31.187055 kernel: SCSI subsystem initialized Feb 12 19:18:31.187079 kernel: audit: type=1130 audit(1707765511.146:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.187089 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:18:31.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.143625 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:18:31.221327 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:18:31.221354 kernel: audit: type=1130 audit(1707765511.195:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.143653 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:18:31.323343 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:18:31.323370 kernel: audit: type=1130 audit(1707765511.235:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.323380 kernel: audit: type=1130 audit(1707765511.293:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.145823 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:18:31.171659 systemd[1]: Started systemd-resolved.service. Feb 12 19:18:31.385282 kernel: audit: type=1130 audit(1707765511.325:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.385305 kernel: audit: type=1130 audit(1707765511.350:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.221722 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:18:31.235873 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:18:31.288497 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:18:31.294509 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:18:31.325843 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:18:31.356035 systemd[1]: Reached target nss-lookup.target. Feb 12 19:18:31.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.394739 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:18:31.474566 kernel: audit: type=1130 audit(1707765511.438:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.406961 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:18:31.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.418651 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:18:31.541603 kernel: audit: type=1130 audit(1707765511.468:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.541626 kernel: audit: type=1130 audit(1707765511.501:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.427678 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:18:31.546395 dracut-cmdline[298]: dracut-dracut-053 Feb 12 19:18:31.546395 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Feb 12 19:18:31.546395 dracut-cmdline[298]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:18:31.438951 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:18:31.469164 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:18:31.503411 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:18:31.624591 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:18:31.636592 kernel: iscsi: registered transport (tcp) Feb 12 19:18:31.659861 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:18:31.659882 kernel: QLogic iSCSI HBA Driver Feb 12 19:18:31.689334 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:18:31.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.695267 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:18:31.754604 kernel: raid6: neonx8 gen() 13810 MB/s Feb 12 19:18:31.772599 kernel: raid6: neonx8 xor() 10827 MB/s Feb 12 19:18:31.793590 kernel: raid6: neonx4 gen() 13524 MB/s Feb 12 19:18:31.815586 kernel: raid6: neonx4 xor() 11122 MB/s Feb 12 19:18:31.836586 kernel: raid6: neonx2 gen() 12950 MB/s Feb 12 19:18:31.857581 kernel: raid6: neonx2 xor() 10247 MB/s Feb 12 19:18:31.879581 kernel: raid6: neonx1 gen() 10500 MB/s Feb 12 19:18:31.899585 kernel: raid6: neonx1 xor() 8789 MB/s Feb 12 19:18:31.919580 kernel: raid6: int64x8 gen() 6298 MB/s Feb 12 19:18:31.941581 kernel: raid6: int64x8 xor() 3549 MB/s Feb 12 19:18:31.961583 kernel: raid6: int64x4 gen() 7218 MB/s Feb 12 19:18:31.981580 kernel: raid6: int64x4 xor() 3856 MB/s Feb 12 19:18:32.002586 kernel: raid6: int64x2 gen() 6152 MB/s Feb 12 19:18:32.022580 kernel: raid6: int64x2 xor() 3325 MB/s Feb 12 19:18:32.042584 kernel: raid6: int64x1 gen() 5047 MB/s Feb 12 19:18:32.067967 kernel: raid6: int64x1 xor() 2646 MB/s Feb 12 19:18:32.067977 kernel: raid6: using algorithm neonx8 gen() 13810 MB/s Feb 12 19:18:32.067986 kernel: raid6: .... xor() 10827 MB/s, rmw enabled Feb 12 19:18:32.072475 kernel: raid6: using neon recovery algorithm Feb 12 19:18:32.089587 kernel: xor: measuring software checksum speed Feb 12 19:18:32.093581 kernel: 8regs : 17289 MB/sec Feb 12 19:18:32.098580 kernel: 32regs : 20723 MB/sec Feb 12 19:18:32.107817 kernel: arm64_neon : 27750 MB/sec Feb 12 19:18:32.107827 kernel: xor: using function: arm64_neon (27750 MB/sec) Feb 12 19:18:32.164593 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:18:32.173994 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:18:32.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:32.183000 audit: BPF prog-id=7 op=LOAD Feb 12 19:18:32.183000 audit: BPF prog-id=8 op=LOAD Feb 12 19:18:32.183885 systemd[1]: Starting systemd-udevd.service... Feb 12 19:18:32.198935 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 12 19:18:32.204137 systemd[1]: Started systemd-udevd.service. Feb 12 19:18:32.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:32.214957 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:18:32.235641 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 12 19:18:32.265088 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:18:32.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:32.270873 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:18:32.302943 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:18:32.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:32.356598 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:18:32.378097 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:18:32.378151 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:18:32.378161 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:18:32.394595 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:18:32.394644 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:18:32.402604 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:18:32.415323 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:18:32.419429 kernel: scsi host0: storvsc_host_t Feb 12 19:18:32.430591 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:18:32.430680 kernel: scsi host1: storvsc_host_t Feb 12 19:18:32.430823 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:18:32.455025 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:18:32.455246 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:18:32.463598 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:18:32.463794 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:18:32.469061 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:18:32.473931 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:18:32.481792 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:18:32.482005 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:18:32.489594 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:32.495585 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:18:32.564588 kernel: hv_netvsc 000d3afb-3570-000d-3afb-3570000d3afb eth0: VF slot 1 added Feb 12 19:18:32.581694 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:18:32.581740 kernel: hv_pci de824959-1372-4e55-b270-8a268d0cbcaa: PCI VMBus probing: Using version 0x10004 Feb 12 19:18:32.601487 kernel: hv_pci de824959-1372-4e55-b270-8a268d0cbcaa: PCI host bridge to bus 1372:00 Feb 12 19:18:32.601619 kernel: pci_bus 1372:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:18:32.601721 kernel: pci_bus 1372:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:18:32.620427 kernel: pci 1372:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:18:32.636412 kernel: pci 1372:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:18:32.662626 kernel: pci 1372:00:02.0: enabling Extended Tags Feb 12 19:18:32.685650 kernel: pci 1372:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 1372:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:18:32.698293 kernel: pci_bus 1372:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:18:32.698393 kernel: pci 1372:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:18:32.740608 kernel: mlx5_core 1372:00:02.0: firmware version: 16.30.1284 Feb 12 19:18:32.926590 kernel: mlx5_core 1372:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:18:32.990629 kernel: hv_netvsc 000d3afb-3570-000d-3afb-3570000d3afb eth0: VF registering: eth1 Feb 12 19:18:32.990819 kernel: mlx5_core 1372:00:02.0 eth1: joined to eth0 Feb 12 19:18:33.003618 kernel: mlx5_core 1372:00:02.0 enP4978s1: renamed from eth1 Feb 12 19:18:33.030883 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:18:33.073603 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (529) Feb 12 19:18:33.086540 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:18:33.350861 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:18:33.365826 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:18:33.372276 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:18:33.385526 systemd[1]: Starting disk-uuid.service... Feb 12 19:18:33.413595 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:34.432554 disk-uuid[602]: The operation has completed successfully. Feb 12 19:18:34.442294 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:34.490424 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:18:34.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.490529 systemd[1]: Finished disk-uuid.service. Feb 12 19:18:34.504964 systemd[1]: Starting verity-setup.service... Feb 12 19:18:34.563596 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:18:34.794492 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:18:34.801046 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:18:34.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.809892 systemd[1]: Finished verity-setup.service. Feb 12 19:18:34.870598 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:18:34.871117 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:18:34.876098 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:18:34.876879 systemd[1]: Starting ignition-setup.service... Feb 12 19:18:34.885889 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:18:34.935110 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:34.935140 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:34.935149 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:34.989427 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:18:34.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.009249 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 12 19:18:35.009291 kernel: audit: type=1130 audit(1707765514.995:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.009217 systemd[1]: Starting systemd-networkd.service... Feb 12 19:18:35.053668 kernel: audit: type=1334 audit(1707765515.001:22): prog-id=9 op=LOAD Feb 12 19:18:35.001000 audit: BPF prog-id=9 op=LOAD Feb 12 19:18:35.065202 systemd-networkd[867]: lo: Link UP Feb 12 19:18:35.069539 systemd-networkd[867]: lo: Gained carrier Feb 12 19:18:35.108178 kernel: audit: type=1130 audit(1707765515.076:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.070035 systemd-networkd[867]: Enumeration completed Feb 12 19:18:35.070796 systemd[1]: Started systemd-networkd.service. Feb 12 19:18:35.071013 systemd-networkd[867]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:18:35.077278 systemd[1]: Reached target network.target. Feb 12 19:18:35.115443 systemd[1]: Starting iscsiuio.service... Feb 12 19:18:35.174544 kernel: audit: type=1130 audit(1707765515.142:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.132882 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:18:35.201902 kernel: audit: type=1130 audit(1707765515.180:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.201978 iscsid[879]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:18:35.201978 iscsid[879]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:18:35.201978 iscsid[879]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:18:35.201978 iscsid[879]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:18:35.201978 iscsid[879]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:18:35.201978 iscsid[879]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:18:35.201978 iscsid[879]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:18:35.355901 kernel: audit: type=1130 audit(1707765515.238:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.133231 systemd[1]: Started iscsiuio.service. Feb 12 19:18:35.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.143952 systemd[1]: Starting iscsid.service... Feb 12 19:18:35.433590 kernel: audit: type=1130 audit(1707765515.361:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.433616 kernel: mlx5_core 1372:00:02.0 enP4978s1: Link up Feb 12 19:18:35.433780 kernel: audit: type=1130 audit(1707765515.402:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.169891 systemd[1]: Started iscsid.service. Feb 12 19:18:35.212312 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:18:35.467749 kernel: hv_netvsc 000d3afb-3570-000d-3afb-3570000d3afb eth0: Data path switched to VF: enP4978s1 Feb 12 19:18:35.467912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:35.218483 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:18:35.243525 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:18:35.277693 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:18:35.304331 systemd[1]: Reached target remote-fs.target. Feb 12 19:18:35.326364 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:18:35.350947 systemd[1]: Finished ignition-setup.service. Feb 12 19:18:35.361825 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:18:35.407382 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:18:35.468953 systemd-networkd[867]: enP4978s1: Link UP Feb 12 19:18:35.469035 systemd-networkd[867]: eth0: Link UP Feb 12 19:18:35.469149 systemd-networkd[867]: eth0: Gained carrier Feb 12 19:18:35.489029 systemd-networkd[867]: enP4978s1: Gained carrier Feb 12 19:18:35.505653 systemd-networkd[867]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:18:36.756868 systemd-networkd[867]: eth0: Gained IPv6LL Feb 12 19:18:41.182305 ignition[894]: Ignition 2.14.0 Feb 12 19:18:41.185956 ignition[894]: Stage: fetch-offline Feb 12 19:18:41.186078 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:41.186123 ignition[894]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:41.329332 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:41.329472 ignition[894]: parsed url from cmdline: "" Feb 12 19:18:41.329475 ignition[894]: no config URL provided Feb 12 19:18:41.329480 ignition[894]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:18:41.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.336879 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:18:41.395090 kernel: audit: type=1130 audit(1707765521.351:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.329488 ignition[894]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:18:41.378590 systemd[1]: Starting ignition-fetch.service... Feb 12 19:18:41.329494 ignition[894]: failed to fetch config: resource requires networking Feb 12 19:18:41.329620 ignition[894]: Ignition finished successfully Feb 12 19:18:41.398450 ignition[900]: Ignition 2.14.0 Feb 12 19:18:41.398457 ignition[900]: Stage: fetch Feb 12 19:18:41.398563 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:41.398597 ignition[900]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:41.404656 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:41.406176 ignition[900]: parsed url from cmdline: "" Feb 12 19:18:41.406181 ignition[900]: no config URL provided Feb 12 19:18:41.406203 ignition[900]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:18:41.441695 unknown[900]: fetched base config from "system" Feb 12 19:18:41.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.406219 ignition[900]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:18:41.489423 kernel: audit: type=1130 audit(1707765521.455:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.441703 unknown[900]: fetched base config from "system" Feb 12 19:18:41.406265 ignition[900]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:18:41.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.441708 unknown[900]: fetched user config from "azure" Feb 12 19:18:41.530216 kernel: audit: type=1130 audit(1707765521.508:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.424394 ignition[900]: GET result: OK Feb 12 19:18:41.445801 systemd[1]: Finished ignition-fetch.service. Feb 12 19:18:41.424466 ignition[900]: config has been read from IMDS userdata Feb 12 19:18:41.480215 systemd[1]: Starting ignition-kargs.service... Feb 12 19:18:41.424498 ignition[900]: parsing config with SHA512: 43fc77c175f44882c4aa99a079aa1581b12cb43de53ca288d0f42a2d3baf0af6c14fe5db8377c1500bbb14b9325e0393f6816edae3a07908c0c3a12b33ee44d3 Feb 12 19:18:41.504593 systemd[1]: Finished ignition-kargs.service. Feb 12 19:18:41.442210 ignition[900]: fetch: fetch complete Feb 12 19:18:41.549041 systemd[1]: Starting ignition-disks.service... Feb 12 19:18:41.442218 ignition[900]: fetch: fetch passed Feb 12 19:18:41.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.575200 systemd[1]: Finished ignition-disks.service. Feb 12 19:18:41.620793 kernel: audit: type=1130 audit(1707765521.579:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.442262 ignition[900]: Ignition finished successfully Feb 12 19:18:41.600946 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:18:41.494301 ignition[907]: Ignition 2.14.0 Feb 12 19:18:41.608820 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:18:41.494308 ignition[907]: Stage: kargs Feb 12 19:18:41.614901 systemd[1]: Reached target local-fs.target. Feb 12 19:18:41.494438 ignition[907]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:41.625972 systemd[1]: Reached target sysinit.target. Feb 12 19:18:41.494467 ignition[907]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:41.634597 systemd[1]: Reached target basic.target. Feb 12 19:18:41.501715 ignition[907]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:41.646925 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:18:41.503154 ignition[907]: kargs: kargs passed Feb 12 19:18:41.503209 ignition[907]: Ignition finished successfully Feb 12 19:18:41.561600 ignition[913]: Ignition 2.14.0 Feb 12 19:18:41.561607 ignition[913]: Stage: disks Feb 12 19:18:41.561718 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:41.561740 ignition[913]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:41.568010 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:41.570453 ignition[913]: disks: disks passed Feb 12 19:18:41.727217 systemd-fsck[921]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:18:41.570506 ignition[913]: Ignition finished successfully Feb 12 19:18:41.735037 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:18:41.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.773866 systemd[1]: Mounting sysroot.mount... Feb 12 19:18:41.785171 kernel: audit: type=1130 audit(1707765521.745:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:41.802598 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:18:41.803493 systemd[1]: Mounted sysroot.mount. Feb 12 19:18:41.813107 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:18:41.866637 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:18:41.872412 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:18:41.882116 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:18:41.882152 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:18:41.888503 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:18:41.937679 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:18:41.943826 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:18:41.972376 initrd-setup-root[937]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:18:41.988959 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (932) Feb 12 19:18:41.988982 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:41.994904 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:42.000376 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:42.004661 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:18:42.017020 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:18:42.026511 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:18:42.036971 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:18:42.655173 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:18:42.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.685848 systemd[1]: Starting ignition-mount.service... Feb 12 19:18:42.705447 kernel: audit: type=1130 audit(1707765522.660:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.694424 systemd[1]: Starting sysroot-boot.service... Feb 12 19:18:42.700065 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:18:42.700182 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:18:42.730014 systemd[1]: Finished sysroot-boot.service. Feb 12 19:18:42.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.769603 kernel: audit: type=1130 audit(1707765522.736:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.778071 ignition[1002]: INFO : Ignition 2.14.0 Feb 12 19:18:42.784228 ignition[1002]: INFO : Stage: mount Feb 12 19:18:42.784228 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:42.784228 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:42.844163 kernel: audit: type=1130 audit(1707765522.806:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:42.844235 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:42.844235 ignition[1002]: INFO : mount: mount passed Feb 12 19:18:42.844235 ignition[1002]: INFO : Ignition finished successfully Feb 12 19:18:42.800101 systemd[1]: Finished ignition-mount.service. Feb 12 19:18:43.296204 coreos-metadata[931]: Feb 12 19:18:43.296 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:18:43.305093 coreos-metadata[931]: Feb 12 19:18:43.298 INFO Fetch successful Feb 12 19:18:43.335544 coreos-metadata[931]: Feb 12 19:18:43.335 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:18:43.348177 coreos-metadata[931]: Feb 12 19:18:43.348 INFO Fetch successful Feb 12 19:18:43.355163 coreos-metadata[931]: Feb 12 19:18:43.353 INFO wrote hostname ci-3510.3.2-a-6e8117160a to /sysroot/etc/hostname Feb 12 19:18:43.364846 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:18:43.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:43.371655 systemd[1]: Starting ignition-files.service... Feb 12 19:18:43.407818 kernel: audit: type=1130 audit(1707765523.370:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:43.405779 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:18:43.432604 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) Feb 12 19:18:43.449910 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:43.449962 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:43.457706 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:43.462741 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:18:43.477236 ignition[1030]: INFO : Ignition 2.14.0 Feb 12 19:18:43.477236 ignition[1030]: INFO : Stage: files Feb 12 19:18:43.489731 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:43.489731 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:43.489731 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:43.489731 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:18:43.489731 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:18:43.489731 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:18:43.587690 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:18:43.597121 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:18:43.597121 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:18:43.596716 unknown[1030]: wrote ssh authorized keys file for user: core Feb 12 19:18:43.620318 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:18:43.620318 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:18:44.096045 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:18:44.387712 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:18:44.405366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:18:44.405366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:18:44.405366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:18:44.779684 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:18:44.913897 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:18:44.937387 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:18:44.937387 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:18:44.937387 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:18:45.096337 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:18:45.393141 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 12 19:18:45.413595 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:18:45.413595 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:18:45.413595 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:18:45.473138 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:18:46.064987 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 12 19:18:46.087281 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:18:46.087281 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:18:46.087281 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:18:46.087281 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:18:46.087281 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:18:46.178693 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1032) Feb 12 19:18:46.162992 systemd[1]: mnt-oem2635974847.mount: Deactivated successfully. Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2635974847" Feb 12 19:18:46.194668 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2635974847": device or resource busy Feb 12 19:18:46.194668 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2635974847", trying btrfs: device or resource busy Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2635974847" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2635974847" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2635974847" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2635974847" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:18:46.194668 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2432988797" Feb 12 19:18:46.518441 kernel: audit: type=1130 audit(1707765526.194:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.518852 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:18:46.518869 kernel: audit: type=1130 audit(1707765526.385:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.518880 kernel: audit: type=1131 audit(1707765526.421:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.189083 systemd[1]: Finished ignition-files.service. Feb 12 19:18:46.524311 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2432988797": device or resource busy Feb 12 19:18:46.524311 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2432988797", trying btrfs: device or resource busy Feb 12 19:18:46.524311 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2432988797" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2432988797" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2432988797" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2432988797" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(16): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:18:46.524311 ignition[1030]: INFO : files: op(16): op(17): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:18:46.825310 kernel: audit: type=1130 audit(1707765526.546:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.825341 kernel: audit: type=1131 audit(1707765526.669:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.198458 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(16): op(17): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(16): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:18:46.836814 ignition[1030]: INFO : files: files passed Feb 12 19:18:46.836814 ignition[1030]: INFO : Ignition finished successfully Feb 12 19:18:47.147631 kernel: audit: type=1131 audit(1707765526.939:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.147668 kernel: audit: type=1131 audit(1707765527.000:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.147679 kernel: audit: type=1131 audit(1707765527.052:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.147689 kernel: audit: type=1131 audit(1707765527.084:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.147698 kernel: audit: type=1131 audit(1707765527.113:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.233339 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:18:47.161502 initrd-setup-root-after-ignition[1055]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:18:47.173976 iscsid[879]: iscsid shutting down. Feb 12 19:18:47.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.246863 systemd[1]: Starting ignition-quench.service... Feb 12 19:18:47.207910 kernel: audit: type=1131 audit(1707765527.180:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.278369 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:18:46.298336 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:18:46.298432 systemd[1]: Finished ignition-quench.service. Feb 12 19:18:46.315409 systemd[1]: Reached target ignition-complete.target. Feb 12 19:18:47.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.336186 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:18:47.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.369401 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:18:47.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.263599 ignition[1068]: INFO : Ignition 2.14.0 Feb 12 19:18:47.263599 ignition[1068]: INFO : Stage: umount Feb 12 19:18:47.263599 ignition[1068]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:47.263599 ignition[1068]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:47.263599 ignition[1068]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:47.263599 ignition[1068]: INFO : umount: umount passed Feb 12 19:18:47.263599 ignition[1068]: INFO : Ignition finished successfully Feb 12 19:18:47.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.369510 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:18:46.422776 systemd[1]: Reached target initrd-fs.target. Feb 12 19:18:46.458153 systemd[1]: Reached target initrd.target. Feb 12 19:18:46.474355 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:18:46.487762 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:18:46.540527 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:18:46.596253 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:18:47.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.621140 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:18:46.627287 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:18:47.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.641868 systemd[1]: Stopped target timers.target. Feb 12 19:18:46.657842 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:18:46.657921 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:18:46.698720 systemd[1]: Stopped target initrd.target. Feb 12 19:18:46.711413 systemd[1]: Stopped target basic.target. Feb 12 19:18:47.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.723546 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:18:46.737939 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:18:46.770872 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:18:47.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.811848 systemd[1]: Stopped target remote-fs.target. Feb 12 19:18:47.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.831164 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:18:47.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.841663 systemd[1]: Stopped target sysinit.target. Feb 12 19:18:46.868010 systemd[1]: Stopped target local-fs.target. Feb 12 19:18:46.882972 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:18:47.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.906322 systemd[1]: Stopped target swap.target. Feb 12 19:18:47.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.920536 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:18:47.582000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:18:46.920616 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:18:47.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.970814 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:18:47.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.984610 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:18:47.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:46.984668 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:18:47.032470 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:18:47.032526 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:18:47.670647 kernel: hv_netvsc 000d3afb-3570-000d-3afb-3570000d3afb eth0: Data path switched from VF: enP4978s1 Feb 12 19:18:47.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.053290 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:18:47.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.053331 systemd[1]: Stopped ignition-files.service. Feb 12 19:18:47.085263 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:18:47.085317 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:18:47.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.135922 systemd[1]: Stopping ignition-mount.service... Feb 12 19:18:47.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.152903 systemd[1]: Stopping iscsid.service... Feb 12 19:18:47.164968 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:18:47.165052 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:18:47.207290 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:18:47.219724 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:18:47.219811 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:18:47.236775 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:18:47.236839 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:18:47.248068 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:18:47.248190 systemd[1]: Stopped iscsid.service. Feb 12 19:18:47.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.257983 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:18:47.258074 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:18:47.269120 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:18:47.269208 systemd[1]: Stopped ignition-mount.service. Feb 12 19:18:47.278660 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:18:47.278710 systemd[1]: Stopped ignition-disks.service. Feb 12 19:18:47.289890 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:18:47.289939 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:18:47.851841 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 12 19:18:47.302956 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:18:47.302998 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:18:47.331567 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:18:47.331631 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:18:47.342997 systemd[1]: Stopped target paths.target. Feb 12 19:18:47.353046 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:18:47.356593 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:18:47.362826 systemd[1]: Stopped target slices.target. Feb 12 19:18:47.371859 systemd[1]: Stopped target sockets.target. Feb 12 19:18:47.380928 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:18:47.380977 systemd[1]: Closed iscsid.socket. Feb 12 19:18:47.393618 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:18:47.393669 systemd[1]: Stopped ignition-setup.service. Feb 12 19:18:47.409544 systemd[1]: Stopping iscsiuio.service... Feb 12 19:18:47.416695 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:18:47.416805 systemd[1]: Stopped iscsiuio.service. Feb 12 19:18:47.425199 systemd[1]: Stopped target network.target. Feb 12 19:18:47.436774 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:18:47.436807 systemd[1]: Closed iscsiuio.socket. Feb 12 19:18:47.446414 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:18:47.456373 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:18:47.465563 systemd-networkd[867]: eth0: DHCPv6 lease lost Feb 12 19:18:47.851000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:18:47.466932 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:18:47.467054 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:18:47.478882 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:18:47.478915 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:18:47.486352 systemd[1]: Stopping network-cleanup.service... Feb 12 19:18:47.502776 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:18:47.502856 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:18:47.513688 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:18:47.513736 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:18:47.530427 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:18:47.530477 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:18:47.536857 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:18:47.550086 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:18:47.550634 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:18:47.550739 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:18:47.564270 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:18:47.564399 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:18:47.574733 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:18:47.574783 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:18:47.583277 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:18:47.583313 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:18:47.590091 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:18:47.590165 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:18:47.602489 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:18:47.602536 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:18:47.611944 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:18:47.611984 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:18:47.623061 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:18:47.644459 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:18:47.644537 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:18:47.665330 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:18:47.665445 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:18:47.677946 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:18:47.692466 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:18:47.692602 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:18:47.700190 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:18:47.700237 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:18:47.763406 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:18:47.763515 systemd[1]: Stopped network-cleanup.service. Feb 12 19:18:47.775287 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:18:47.788441 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:18:47.809093 systemd[1]: Switching root. Feb 12 19:18:47.853501 systemd-journald[276]: Journal stopped Feb 12 19:19:02.009417 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:19:02.009437 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:19:02.009447 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:19:02.009457 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:19:02.009464 kernel: SELinux: policy capability open_perms=1 Feb 12 19:19:02.009472 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:19:02.009482 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:19:02.009491 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:19:02.009499 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:19:02.009508 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:19:02.009518 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:19:02.009527 systemd[1]: Successfully loaded SELinux policy in 300.809ms. Feb 12 19:19:02.009537 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.864ms. Feb 12 19:19:02.009547 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:19:02.009558 systemd[1]: Detected virtualization microsoft. Feb 12 19:19:02.009567 systemd[1]: Detected architecture arm64. Feb 12 19:19:02.009586 systemd[1]: Detected first boot. Feb 12 19:19:02.009595 systemd[1]: Hostname set to . Feb 12 19:19:02.009604 systemd[1]: Initializing machine ID from random generator. Feb 12 19:19:02.009613 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:19:02.009621 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 12 19:19:02.009631 kernel: audit: type=1400 audit(1707765532.544:88): avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:19:02.009643 kernel: audit: type=1300 audit(1707765532.544:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:02.009652 kernel: audit: type=1327 audit(1707765532.544:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:19:02.009661 kernel: audit: type=1400 audit(1707765532.559:89): avc: denied { associate } for pid=1101 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:19:02.009671 kernel: audit: type=1300 audit(1707765532.559:89): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:02.009680 kernel: audit: type=1307 audit(1707765532.559:89): cwd="/" Feb 12 19:19:02.009690 kernel: audit: type=1302 audit(1707765532.559:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:02.009700 kernel: audit: type=1302 audit(1707765532.559:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:02.009710 kernel: audit: type=1327 audit(1707765532.559:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:19:02.009719 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:19:02.009728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:19:02.009738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:19:02.009748 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:19:02.009758 kernel: audit: type=1334 audit(1707765541.196:90): prog-id=12 op=LOAD Feb 12 19:19:02.009767 kernel: audit: type=1334 audit(1707765541.196:91): prog-id=3 op=UNLOAD Feb 12 19:19:02.009775 kernel: audit: type=1334 audit(1707765541.196:92): prog-id=13 op=LOAD Feb 12 19:19:02.009784 kernel: audit: type=1334 audit(1707765541.196:93): prog-id=14 op=LOAD Feb 12 19:19:02.009793 kernel: audit: type=1334 audit(1707765541.196:94): prog-id=4 op=UNLOAD Feb 12 19:19:02.009802 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:19:02.009812 kernel: audit: type=1334 audit(1707765541.196:95): prog-id=5 op=UNLOAD Feb 12 19:19:02.009821 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:19:02.009832 kernel: audit: type=1334 audit(1707765541.205:96): prog-id=15 op=LOAD Feb 12 19:19:02.009841 kernel: audit: type=1334 audit(1707765541.205:97): prog-id=12 op=UNLOAD Feb 12 19:19:02.009849 kernel: audit: type=1334 audit(1707765541.205:98): prog-id=16 op=LOAD Feb 12 19:19:02.009858 kernel: audit: type=1334 audit(1707765541.205:99): prog-id=17 op=LOAD Feb 12 19:19:02.009868 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:19:02.009877 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:19:02.009886 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:19:02.009897 systemd[1]: Created slice system-getty.slice. Feb 12 19:19:02.009907 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:19:02.009916 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:19:02.009926 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:19:02.009935 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:19:02.009945 systemd[1]: Created slice user.slice. Feb 12 19:19:02.009954 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:19:02.009963 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:19:02.009972 systemd[1]: Set up automount boot.automount. Feb 12 19:19:02.009982 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:19:02.009992 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:19:02.010001 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:19:02.010010 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:19:02.010020 systemd[1]: Reached target integritysetup.target. Feb 12 19:19:02.010029 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:19:02.010038 systemd[1]: Reached target remote-fs.target. Feb 12 19:19:02.010047 systemd[1]: Reached target slices.target. Feb 12 19:19:02.010058 systemd[1]: Reached target swap.target. Feb 12 19:19:02.010067 systemd[1]: Reached target torcx.target. Feb 12 19:19:02.010076 systemd[1]: Reached target veritysetup.target. Feb 12 19:19:02.010086 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:19:02.010096 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:19:02.010105 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:19:02.010116 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:19:02.010125 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:19:02.010135 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:19:02.010144 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:19:02.010153 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:19:02.010162 systemd[1]: Mounting media.mount... Feb 12 19:19:02.010172 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:19:02.010181 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:19:02.010191 systemd[1]: Mounting tmp.mount... Feb 12 19:19:02.010201 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:19:02.010210 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:19:02.010220 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:19:02.010229 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:19:02.010238 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:19:02.010247 systemd[1]: Starting modprobe@drm.service... Feb 12 19:19:02.010257 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:19:02.010266 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:19:02.010276 systemd[1]: Starting modprobe@loop.service... Feb 12 19:19:02.010287 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:19:02.010296 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:19:02.010306 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:19:02.010315 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:19:02.010324 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:19:02.010335 systemd[1]: Stopped systemd-journald.service. Feb 12 19:19:02.010345 systemd[1]: systemd-journald.service: Consumed 3.682s CPU time. Feb 12 19:19:02.010355 systemd[1]: Starting systemd-journald.service... Feb 12 19:19:02.010365 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:19:02.010374 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:19:02.010383 kernel: fuse: init (API version 7.34) Feb 12 19:19:02.010392 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:19:02.010401 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:19:02.010411 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:19:02.010420 systemd[1]: Stopped verity-setup.service. Feb 12 19:19:02.010429 kernel: loop: module loaded Feb 12 19:19:02.010439 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:19:02.010448 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:19:02.010458 systemd[1]: Mounted media.mount. Feb 12 19:19:02.010467 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:19:02.010476 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:19:02.010490 systemd-journald[1199]: Journal started Feb 12 19:19:02.010531 systemd-journald[1199]: Runtime Journal (/run/log/journal/72a8f0b4b51548e5bca4da65c8074f1b) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:18:50.285000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:18:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:51.125000 audit: BPF prog-id=10 op=LOAD Feb 12 19:18:51.125000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:18:51.125000 audit: BPF prog-id=11 op=LOAD Feb 12 19:18:51.125000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:18:52.544000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:18:52.544000 audit[1101]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:52.544000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:18:52.559000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:18:52.559000 audit[1101]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:52.559000 audit: CWD cwd="/" Feb 12 19:18:52.559000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:52.559000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:52.559000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:19:01.196000 audit: BPF prog-id=12 op=LOAD Feb 12 19:19:01.196000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:19:01.196000 audit: BPF prog-id=13 op=LOAD Feb 12 19:19:01.196000 audit: BPF prog-id=14 op=LOAD Feb 12 19:19:01.196000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:19:01.196000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:19:01.205000 audit: BPF prog-id=15 op=LOAD Feb 12 19:19:01.205000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:19:01.205000 audit: BPF prog-id=16 op=LOAD Feb 12 19:19:01.205000 audit: BPF prog-id=17 op=LOAD Feb 12 19:19:01.205000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:19:01.205000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:19:01.212000 audit: BPF prog-id=18 op=LOAD Feb 12 19:19:01.212000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:19:01.219000 audit: BPF prog-id=19 op=LOAD Feb 12 19:19:01.225000 audit: BPF prog-id=20 op=LOAD Feb 12 19:19:01.225000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:19:01.225000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:19:01.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.265000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:19:01.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:01.872000 audit: BPF prog-id=21 op=LOAD Feb 12 19:19:01.872000 audit: BPF prog-id=22 op=LOAD Feb 12 19:19:01.872000 audit: BPF prog-id=23 op=LOAD Feb 12 19:19:01.872000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:19:01.872000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:19:01.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.007000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:19:02.007000 audit[1199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffee3a0bf0 a2=4000 a3=1 items=0 ppid=1 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:02.007000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:19:01.195753 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:18:52.506795 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:19:01.227163 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:18:52.507171 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:19:01.227526 systemd[1]: systemd-journald.service: Consumed 3.682s CPU time. Feb 12 19:18:52.507189 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:18:52.507228 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:18:52.507239 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:18:52.507267 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:18:52.507279 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:18:52.507482 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:18:52.507512 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:18:52.507525 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:18:52.525801 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:18:52.525846 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:18:52.525864 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:18:52.525878 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:18:52.525906 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:18:52.525919 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:18:59.673649 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:59.673935 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:59.674057 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:59.674234 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:59.674293 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:18:59.674361 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:18:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:19:02.021103 systemd[1]: Started systemd-journald.service. Feb 12 19:19:02.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.021924 systemd[1]: Mounted tmp.mount. Feb 12 19:19:02.025865 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:19:02.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.030787 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:19:02.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.036549 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:19:02.036692 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:19:02.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.041668 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:19:02.041786 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:19:02.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.046716 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:19:02.046832 systemd[1]: Finished modprobe@drm.service. Feb 12 19:19:02.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.051910 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:19:02.052026 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:19:02.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.057235 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:19:02.057351 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:19:02.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.062104 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:19:02.062223 systemd[1]: Finished modprobe@loop.service. Feb 12 19:19:02.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.067617 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:19:02.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.073343 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:19:02.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.078606 systemd[1]: Reached target network-pre.target. Feb 12 19:19:02.087810 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:19:02.093700 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:19:02.098802 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:19:02.116363 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:19:02.122109 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:19:02.127655 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:19:02.128897 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:19:02.136992 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:19:02.138233 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:19:02.146936 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:19:02.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.154044 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:19:02.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.159925 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:19:02.165102 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:19:02.170792 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:19:02.176765 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:19:02.185103 udevadm[1221]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:19:02.212496 systemd-journald[1199]: Time spent on flushing to /var/log/journal/72a8f0b4b51548e5bca4da65c8074f1b is 13.850ms for 1124 entries. Feb 12 19:19:02.212496 systemd-journald[1199]: System Journal (/var/log/journal/72a8f0b4b51548e5bca4da65c8074f1b) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:19:02.386436 systemd-journald[1199]: Received client request to flush runtime journal. Feb 12 19:19:02.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.243016 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:19:02.248508 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:19:02.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.315735 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:19:02.387748 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:19:02.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:02.947410 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:19:03.604658 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:19:03.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:03.609000 audit: BPF prog-id=24 op=LOAD Feb 12 19:19:03.609000 audit: BPF prog-id=25 op=LOAD Feb 12 19:19:03.610000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:19:03.610000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:19:03.611235 systemd[1]: Starting systemd-udevd.service... Feb 12 19:19:03.630550 systemd-udevd[1224]: Using default interface naming scheme 'v252'. Feb 12 19:19:04.026538 systemd[1]: Started systemd-udevd.service. Feb 12 19:19:04.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.038000 audit: BPF prog-id=26 op=LOAD Feb 12 19:19:04.040091 systemd[1]: Starting systemd-networkd.service... Feb 12 19:19:04.066602 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:19:04.104474 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:19:04.103000 audit: BPF prog-id=27 op=LOAD Feb 12 19:19:04.103000 audit: BPF prog-id=28 op=LOAD Feb 12 19:19:04.103000 audit: BPF prog-id=29 op=LOAD Feb 12 19:19:04.117000 audit[1244]: AVC avc: denied { confidentiality } for pid=1244 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:19:04.164054 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:19:04.164145 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:19:04.164176 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:19:04.164195 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:19:04.171600 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:19:04.192566 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:19:04.202322 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:19:04.202349 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:19:04.202374 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:19:04.202392 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:19:03.814747 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:19:03.895412 systemd-journald[1199]: Time jumped backwards, rotating. Feb 12 19:19:03.895501 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:19:03.895516 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:19:03.895532 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:19:03.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.117000 audit[1244]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacd82c530 a1=aa2c a2=ffff976b24b0 a3=aaaacd783010 items=12 ppid=1224 pid=1244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:04.117000 audit: CWD cwd="/" Feb 12 19:19:04.117000 audit: PATH item=0 name=(null) inode=6459 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=1 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=2 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=3 name=(null) inode=10823 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=4 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=5 name=(null) inode=10824 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=6 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=7 name=(null) inode=10825 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=8 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=9 name=(null) inode=10826 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=10 name=(null) inode=10822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PATH item=11 name=(null) inode=10827 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:19:04.117000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:19:03.844850 systemd[1]: Started systemd-userdbd.service. Feb 12 19:19:04.203248 systemd-networkd[1245]: lo: Link UP Feb 12 19:19:04.203526 systemd-networkd[1245]: lo: Gained carrier Feb 12 19:19:04.204135 systemd-networkd[1245]: Enumeration completed Feb 12 19:19:04.204337 systemd[1]: Started systemd-networkd.service. Feb 12 19:19:04.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.210753 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:19:04.243195 systemd-networkd[1245]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:19:04.282741 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1239) Feb 12 19:19:04.297743 kernel: mlx5_core 1372:00:02.0 enP4978s1: Link up Feb 12 19:19:04.310473 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:19:04.317524 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:19:04.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.329753 kernel: hv_netvsc 000d3afb-3570-000d-3afb-3570000d3afb eth0: Data path switched to VF: enP4978s1 Feb 12 19:19:04.330877 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:19:04.331294 systemd-networkd[1245]: enP4978s1: Link UP Feb 12 19:19:04.331664 systemd-networkd[1245]: eth0: Link UP Feb 12 19:19:04.331759 systemd-networkd[1245]: eth0: Gained carrier Feb 12 19:19:04.336235 systemd-networkd[1245]: enP4978s1: Gained carrier Feb 12 19:19:04.344874 systemd-networkd[1245]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:19:04.653177 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:19:04.704564 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:19:04.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.709625 systemd[1]: Reached target cryptsetup.target. Feb 12 19:19:04.715654 systemd[1]: Starting lvm2-activation.service... Feb 12 19:19:04.720121 lvm[1305]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:19:04.747734 systemd[1]: Finished lvm2-activation.service. Feb 12 19:19:04.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:04.752810 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:19:04.757981 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:19:04.758010 systemd[1]: Reached target local-fs.target. Feb 12 19:19:04.762837 systemd[1]: Reached target machines.target. Feb 12 19:19:04.768898 systemd[1]: Starting ldconfig.service... Feb 12 19:19:04.773157 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:19:04.773226 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:19:04.774464 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:19:04.780161 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:19:04.787251 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:19:04.791905 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:19:04.791969 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:19:04.793051 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:19:04.866297 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1307 (bootctl) Feb 12 19:19:04.867567 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:19:05.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:05.167258 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:19:05.227369 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:19:05.227969 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:19:05.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:05.266872 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:19:05.381142 systemd-fsck[1315]: fsck.fat 4.2 (2021-01-31) Feb 12 19:19:05.381142 systemd-fsck[1315]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:19:05.382767 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:19:05.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:05.391011 systemd[1]: Mounting boot.mount... Feb 12 19:19:05.407407 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:19:05.411683 systemd[1]: Mounted boot.mount. Feb 12 19:19:05.422921 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:19:05.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:05.495074 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:19:06.318880 systemd-networkd[1245]: eth0: Gained IPv6LL Feb 12 19:19:06.323586 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:19:06.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:06.333630 kernel: kauditd_printk_skb: 83 callbacks suppressed Feb 12 19:19:06.333702 kernel: audit: type=1130 audit(1707765546.328:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:06.981167 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:19:06.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:06.987443 systemd[1]: Starting audit-rules.service... Feb 12 19:19:07.004724 kernel: audit: type=1130 audit(1707765546.985:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.009152 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:19:07.014641 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:19:07.019000 audit: BPF prog-id=30 op=LOAD Feb 12 19:19:07.021229 systemd[1]: Starting systemd-resolved.service... Feb 12 19:19:07.029267 kernel: audit: type=1334 audit(1707765547.019:168): prog-id=30 op=LOAD Feb 12 19:19:07.029000 audit: BPF prog-id=31 op=LOAD Feb 12 19:19:07.031584 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:19:07.039611 kernel: audit: type=1334 audit(1707765547.029:169): prog-id=31 op=LOAD Feb 12 19:19:07.041205 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:19:07.114061 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:19:07.118000 audit[1327]: SYSTEM_BOOT pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.137753 kernel: audit: type=1127 audit(1707765547.118:170): pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.138596 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:19:07.157750 kernel: audit: type=1130 audit(1707765547.137:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.158013 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:19:07.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.163873 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:19:07.185069 kernel: audit: type=1130 audit(1707765547.162:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.185832 systemd[1]: Reached target time-set.target. Feb 12 19:19:07.206393 kernel: audit: type=1130 audit(1707765547.184:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.203524 systemd-resolved[1325]: Positive Trust Anchors: Feb 12 19:19:07.203531 systemd-resolved[1325]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:19:07.203558 systemd-resolved[1325]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:19:07.207574 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:19:07.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.232756 kernel: audit: type=1130 audit(1707765547.212:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.266269 systemd-resolved[1325]: Using system hostname 'ci-3510.3.2-a-6e8117160a'. Feb 12 19:19:07.267934 systemd[1]: Started systemd-resolved.service. Feb 12 19:19:07.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.273056 systemd[1]: Reached target network.target. Feb 12 19:19:07.290733 kernel: audit: type=1130 audit(1707765547.272:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:07.295591 systemd[1]: Reached target network-online.target. Feb 12 19:19:07.300168 systemd[1]: Reached target nss-lookup.target. Feb 12 19:19:07.545211 augenrules[1342]: No rules Feb 12 19:19:07.544000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:19:07.544000 audit[1342]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffd211c60 a2=420 a3=0 items=0 ppid=1321 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:07.544000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:19:07.546305 systemd[1]: Finished audit-rules.service. Feb 12 19:19:07.585124 systemd-timesyncd[1326]: Contacted time server 206.82.28.3:123 (0.flatcar.pool.ntp.org). Feb 12 19:19:07.585192 systemd-timesyncd[1326]: Initial clock synchronization to Mon 2024-02-12 19:19:07.588122 UTC. Feb 12 19:19:16.578816 ldconfig[1306]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:19:16.593139 systemd[1]: Finished ldconfig.service. Feb 12 19:19:16.599468 systemd[1]: Starting systemd-update-done.service... Feb 12 19:19:16.663517 systemd[1]: Finished systemd-update-done.service. Feb 12 19:19:16.668390 systemd[1]: Reached target sysinit.target. Feb 12 19:19:16.672821 systemd[1]: Started motdgen.path. Feb 12 19:19:16.676394 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:19:16.683216 systemd[1]: Started logrotate.timer. Feb 12 19:19:16.687431 systemd[1]: Started mdadm.timer. Feb 12 19:19:16.691136 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:19:16.697130 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:19:16.697160 systemd[1]: Reached target paths.target. Feb 12 19:19:16.701530 systemd[1]: Reached target timers.target. Feb 12 19:19:16.707764 systemd[1]: Listening on dbus.socket. Feb 12 19:19:16.712743 systemd[1]: Starting docker.socket... Feb 12 19:19:16.733426 systemd[1]: Listening on sshd.socket. Feb 12 19:19:16.737463 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:19:16.737947 systemd[1]: Listening on docker.socket. Feb 12 19:19:16.743264 systemd[1]: Reached target sockets.target. Feb 12 19:19:16.747589 systemd[1]: Reached target basic.target. Feb 12 19:19:16.751648 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:19:16.751675 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:19:16.752805 systemd[1]: Starting containerd.service... Feb 12 19:19:16.757803 systemd[1]: Starting dbus.service... Feb 12 19:19:16.762243 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:19:16.767503 systemd[1]: Starting extend-filesystems.service... Feb 12 19:19:16.774338 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:19:16.775415 systemd[1]: Starting motdgen.service... Feb 12 19:19:16.779790 systemd[1]: Started nvidia.service. Feb 12 19:19:16.784673 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:19:16.790031 systemd[1]: Starting prepare-critools.service... Feb 12 19:19:16.795501 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:19:16.800686 systemd[1]: Starting sshd-keygen.service... Feb 12 19:19:16.806804 systemd[1]: Starting systemd-logind.service... Feb 12 19:19:16.810918 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:19:16.810983 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:19:16.811359 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:19:16.811972 systemd[1]: Starting update-engine.service... Feb 12 19:19:16.816811 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:19:16.827279 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:19:16.827460 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:19:16.846913 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:19:16.847082 systemd[1]: Finished motdgen.service. Feb 12 19:19:16.862470 jq[1370]: true Feb 12 19:19:16.863015 jq[1352]: false Feb 12 19:19:16.863998 extend-filesystems[1353]: Found sda Feb 12 19:19:16.863998 extend-filesystems[1353]: Found sda1 Feb 12 19:19:16.863998 extend-filesystems[1353]: Found sda2 Feb 12 19:19:16.875834 extend-filesystems[1353]: Found sda3 Feb 12 19:19:16.875834 extend-filesystems[1353]: Found usr Feb 12 19:19:16.875834 extend-filesystems[1353]: Found sda4 Feb 12 19:19:16.875834 extend-filesystems[1353]: Found sda6 Feb 12 19:19:16.875834 extend-filesystems[1353]: Found sda7 Feb 12 19:19:16.875834 extend-filesystems[1353]: Found sda9 Feb 12 19:19:16.875834 extend-filesystems[1353]: Checking size of /dev/sda9 Feb 12 19:19:16.928874 env[1379]: time="2024-02-12T19:19:16.919184381Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:19:16.883282 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:19:16.883471 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:19:16.907944 systemd-logind[1365]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:19:16.908117 systemd-logind[1365]: New seat seat0. Feb 12 19:19:16.938736 jq[1381]: true Feb 12 19:19:16.952641 env[1379]: time="2024-02-12T19:19:16.952592614Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:19:16.953245 env[1379]: time="2024-02-12T19:19:16.953218087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.955801 env[1379]: time="2024-02-12T19:19:16.955762142Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:19:16.955922 env[1379]: time="2024-02-12T19:19:16.955905319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.956261 env[1379]: time="2024-02-12T19:19:16.956236117Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:19:16.956627 env[1379]: time="2024-02-12T19:19:16.956605160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.956754 env[1379]: time="2024-02-12T19:19:16.956732254Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:19:16.956817 env[1379]: time="2024-02-12T19:19:16.956802143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.956963 env[1379]: time="2024-02-12T19:19:16.956945399Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.957260 env[1379]: time="2024-02-12T19:19:16.957239833Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:19:16.957476 env[1379]: time="2024-02-12T19:19:16.957455298Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:19:16.957544 env[1379]: time="2024-02-12T19:19:16.957531227Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:19:16.957670 env[1379]: time="2024-02-12T19:19:16.957652481Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:19:16.957795 env[1379]: time="2024-02-12T19:19:16.957780216Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:19:16.970014 env[1379]: time="2024-02-12T19:19:16.969971670Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:19:16.970174 env[1379]: time="2024-02-12T19:19:16.970158411Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:19:16.970242 env[1379]: time="2024-02-12T19:19:16.970229299Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:19:16.970323 env[1379]: time="2024-02-12T19:19:16.970309389Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.970434 env[1379]: time="2024-02-12T19:19:16.970420442Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.970500 env[1379]: time="2024-02-12T19:19:16.970487249Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.970557 env[1379]: time="2024-02-12T19:19:16.970544336Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.971021 env[1379]: time="2024-02-12T19:19:16.970995108Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.971106 env[1379]: time="2024-02-12T19:19:16.971091840Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.971180 env[1379]: time="2024-02-12T19:19:16.971166088Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.971242 env[1379]: time="2024-02-12T19:19:16.971229535Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.971303 env[1379]: time="2024-02-12T19:19:16.971290623Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:19:16.971486 env[1379]: time="2024-02-12T19:19:16.971468283Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:19:16.971641 env[1379]: time="2024-02-12T19:19:16.971624661Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:19:16.971975 env[1379]: time="2024-02-12T19:19:16.971955380Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:19:16.972072 env[1379]: time="2024-02-12T19:19:16.972057551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972142 env[1379]: time="2024-02-12T19:19:16.972128040Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:19:16.972245 env[1379]: time="2024-02-12T19:19:16.972231572Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972366 env[1379]: time="2024-02-12T19:19:16.972351186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972435 env[1379]: time="2024-02-12T19:19:16.972421314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972498 env[1379]: time="2024-02-12T19:19:16.972485201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972557 env[1379]: time="2024-02-12T19:19:16.972543888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972612 env[1379]: time="2024-02-12T19:19:16.972599654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972669 env[1379]: time="2024-02-12T19:19:16.972657261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972749 env[1379]: time="2024-02-12T19:19:16.972734910Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.972833 env[1379]: time="2024-02-12T19:19:16.972819120Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:19:16.973010 env[1379]: time="2024-02-12T19:19:16.972992460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.973085 env[1379]: time="2024-02-12T19:19:16.973071589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.973145 env[1379]: time="2024-02-12T19:19:16.973133076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.973205 env[1379]: time="2024-02-12T19:19:16.973191723Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:19:16.973273 env[1379]: time="2024-02-12T19:19:16.973258291Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:19:16.973326 env[1379]: time="2024-02-12T19:19:16.973312737Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:19:16.973389 env[1379]: time="2024-02-12T19:19:16.973374424Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:19:16.973467 env[1379]: time="2024-02-12T19:19:16.973453513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:19:16.973773 env[1379]: time="2024-02-12T19:19:16.973690021Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.973988775Z" level=info msg="Connect containerd service" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.974030620Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.974680536Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.974977890Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.975014614Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.975062620Z" level=info msg="containerd successfully booted in 0.056798s" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.979863257Z" level=info msg="Start subscribing containerd event" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.979916543Z" level=info msg="Start recovering state" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.979989631Z" level=info msg="Start event monitor" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.980015354Z" level=info msg="Start snapshots syncer" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.980025875Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:19:16.999309 env[1379]: time="2024-02-12T19:19:16.980034756Z" level=info msg="Start streaming server" Feb 12 19:19:16.999587 extend-filesystems[1353]: Old size kept for /dev/sda9 Feb 12 19:19:16.999587 extend-filesystems[1353]: Found sr0 Feb 12 19:19:16.975141 systemd[1]: Started containerd.service. Feb 12 19:19:17.021604 tar[1373]: crictl Feb 12 19:19:17.021877 tar[1372]: ./ Feb 12 19:19:17.021877 tar[1372]: ./loopback Feb 12 19:19:16.991155 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:19:16.992225 systemd[1]: Finished extend-filesystems.service. Feb 12 19:19:17.072724 tar[1372]: ./bandwidth Feb 12 19:19:17.108821 bash[1419]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:19:17.109775 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:19:17.131341 dbus-daemon[1351]: [system] SELinux support is enabled Feb 12 19:19:17.131492 systemd[1]: Started dbus.service. Feb 12 19:19:17.138684 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:19:17.139767 systemd[1]: Reached target system-config.target. Feb 12 19:19:17.147028 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:19:17.147049 systemd[1]: Reached target user-config.target. Feb 12 19:19:17.158789 systemd[1]: Started systemd-logind.service. Feb 12 19:19:17.198116 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:19:17.202298 tar[1372]: ./ptp Feb 12 19:19:17.267389 tar[1372]: ./vlan Feb 12 19:19:17.330917 tar[1372]: ./host-device Feb 12 19:19:17.383886 tar[1372]: ./tuning Feb 12 19:19:17.435655 tar[1372]: ./vrf Feb 12 19:19:17.487521 tar[1372]: ./sbr Feb 12 19:19:17.522162 tar[1372]: ./tap Feb 12 19:19:17.580091 tar[1372]: ./dhcp Feb 12 19:19:17.629647 update_engine[1368]: I0212 19:19:17.601297 1368 main.cc:92] Flatcar Update Engine starting Feb 12 19:19:17.665500 tar[1372]: ./static Feb 12 19:19:17.683382 systemd[1]: Started update-engine.service. Feb 12 19:19:17.683832 update_engine[1368]: I0212 19:19:17.683435 1368 update_check_scheduler.cc:74] Next update check in 9m30s Feb 12 19:19:17.691559 systemd[1]: Started locksmithd.service. Feb 12 19:19:17.703738 tar[1372]: ./firewall Feb 12 19:19:17.713135 systemd[1]: Finished prepare-critools.service. Feb 12 19:19:17.742832 tar[1372]: ./macvlan Feb 12 19:19:17.776726 tar[1372]: ./dummy Feb 12 19:19:17.811076 tar[1372]: ./bridge Feb 12 19:19:17.847733 tar[1372]: ./ipvlan Feb 12 19:19:17.880833 tar[1372]: ./portmap Feb 12 19:19:17.912660 tar[1372]: ./host-local Feb 12 19:19:18.008526 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:19:18.616862 sshd_keygen[1369]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:19:18.633461 systemd[1]: Finished sshd-keygen.service. Feb 12 19:19:18.639400 systemd[1]: Starting issuegen.service... Feb 12 19:19:18.644165 systemd[1]: Started waagent.service. Feb 12 19:19:18.648814 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:19:18.648982 systemd[1]: Finished issuegen.service. Feb 12 19:19:18.655286 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:19:18.662469 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:19:18.669101 systemd[1]: Started getty@tty1.service. Feb 12 19:19:18.677683 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:19:18.682777 systemd[1]: Reached target getty.target. Feb 12 19:19:18.686944 systemd[1]: Reached target multi-user.target. Feb 12 19:19:18.692675 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:19:18.701071 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:19:18.701262 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:19:18.707886 systemd[1]: Startup finished in 778ms (kernel) + 19.156s (initrd) + 29.285s (userspace) = 49.220s. Feb 12 19:19:19.367635 login[1476]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:19:19.392353 login[1475]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:19:19.433876 systemd[1]: Created slice user-500.slice. Feb 12 19:19:19.434892 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:19:19.438022 systemd-logind[1365]: New session 2 of user core. Feb 12 19:19:19.499785 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:19:19.501193 systemd[1]: Starting user@500.service... Feb 12 19:19:19.521272 (systemd)[1479]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:19.540837 locksmithd[1454]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:19:19.821736 systemd[1479]: Queued start job for default target default.target. Feb 12 19:19:19.822543 systemd[1479]: Reached target paths.target. Feb 12 19:19:19.822654 systemd[1479]: Reached target sockets.target. Feb 12 19:19:19.822741 systemd[1479]: Reached target timers.target. Feb 12 19:19:19.822896 systemd[1479]: Reached target basic.target. Feb 12 19:19:19.823021 systemd[1479]: Reached target default.target. Feb 12 19:19:19.823084 systemd[1]: Started user@500.service. Feb 12 19:19:19.823275 systemd[1479]: Startup finished in 295ms. Feb 12 19:19:19.824027 systemd[1]: Started session-2.scope. Feb 12 19:19:20.369115 login[1476]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:19:20.372469 systemd-logind[1365]: New session 1 of user core. Feb 12 19:19:20.373318 systemd[1]: Started session-1.scope. Feb 12 19:19:26.531045 waagent[1473]: 2024-02-12T19:19:26.530936Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:19:26.538097 waagent[1473]: 2024-02-12T19:19:26.538009Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:19:26.543093 waagent[1473]: 2024-02-12T19:19:26.543014Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:19:26.548457 waagent[1473]: 2024-02-12T19:19:26.548369Z INFO Daemon Daemon Run daemon Feb 12 19:19:26.553991 waagent[1473]: 2024-02-12T19:19:26.553911Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:19:26.571221 waagent[1473]: 2024-02-12T19:19:26.571080Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:19:26.586629 waagent[1473]: 2024-02-12T19:19:26.586487Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:19:26.596784 waagent[1473]: 2024-02-12T19:19:26.596672Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:19:26.602174 waagent[1473]: 2024-02-12T19:19:26.602085Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:19:26.608142 waagent[1473]: 2024-02-12T19:19:26.608068Z INFO Daemon Daemon Activate resource disk Feb 12 19:19:26.613264 waagent[1473]: 2024-02-12T19:19:26.613190Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:19:26.627892 waagent[1473]: 2024-02-12T19:19:26.627803Z INFO Daemon Daemon Found device: None Feb 12 19:19:26.632910 waagent[1473]: 2024-02-12T19:19:26.632823Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:19:26.641748 waagent[1473]: 2024-02-12T19:19:26.641645Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:19:26.653954 waagent[1473]: 2024-02-12T19:19:26.653878Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:19:26.660417 waagent[1473]: 2024-02-12T19:19:26.660328Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:19:26.673496 waagent[1473]: 2024-02-12T19:19:26.673358Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:19:26.688770 waagent[1473]: 2024-02-12T19:19:26.688610Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:19:26.698869 waagent[1473]: 2024-02-12T19:19:26.698773Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:19:26.704114 waagent[1473]: 2024-02-12T19:19:26.704030Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:19:26.819504 waagent[1473]: 2024-02-12T19:19:26.819314Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:19:26.944123 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:19:26.980497 waagent[1473]: 2024-02-12T19:19:26.980345Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:19:26.985499 waagent[1473]: 2024-02-12T19:19:26.985413Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:19:26.991196 waagent[1473]: 2024-02-12T19:19:26.991124Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:19:26.997754 waagent[1473]: 2024-02-12T19:19:26.997675Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:19:27.003104 waagent[1473]: 2024-02-12T19:19:27.003041Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:19:27.008660 waagent[1473]: 2024-02-12T19:19:27.008595Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:19:27.188607 waagent[1473]: 2024-02-12T19:19:27.188538Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:19:27.196678 waagent[1473]: 2024-02-12T19:19:27.196629Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:19:27.203238 waagent[1473]: 2024-02-12T19:19:27.203154Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:19:27.870370 waagent[1473]: 2024-02-12T19:19:27.870216Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:19:27.890567 waagent[1473]: 2024-02-12T19:19:27.890480Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:19:27.896959 waagent[1473]: 2024-02-12T19:19:27.896871Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:19:27.980781 waagent[1473]: 2024-02-12T19:19:27.980633Z INFO Daemon Daemon Found private key matching thumbprint 013833255CEAD4F6F95DC2953C79D76C16C3F3EF Feb 12 19:19:27.989536 waagent[1473]: 2024-02-12T19:19:27.989446Z INFO Daemon Daemon Certificate with thumbprint 481B891B72514AAEE89BF9797568C62936838F92 has no matching private key. Feb 12 19:19:27.999429 waagent[1473]: 2024-02-12T19:19:27.999339Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:19:29.206956 waagent[1473]: 2024-02-12T19:19:29.206898Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 20af08ee-564f-4955-b84a-32972c03699b New eTag: 3942351761466204126] Feb 12 19:19:29.219399 waagent[1473]: 2024-02-12T19:19:29.219311Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:19:29.236752 waagent[1473]: 2024-02-12T19:19:29.236671Z INFO Daemon Daemon Starting provisioning Feb 12 19:19:29.242292 waagent[1473]: 2024-02-12T19:19:29.242206Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:19:29.247516 waagent[1473]: 2024-02-12T19:19:29.247442Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-6e8117160a] Feb 12 19:19:29.294904 waagent[1473]: 2024-02-12T19:19:29.294759Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-6e8117160a] Feb 12 19:19:29.302316 waagent[1473]: 2024-02-12T19:19:29.302217Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:19:29.309439 waagent[1473]: 2024-02-12T19:19:29.309356Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:19:29.326057 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:19:29.326216 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:19:29.326276 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:19:29.326530 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:19:29.329756 systemd-networkd[1245]: eth0: DHCPv6 lease lost Feb 12 19:19:29.331020 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:19:29.331187 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:19:29.333092 systemd[1]: Starting systemd-networkd.service... Feb 12 19:19:29.360452 systemd-networkd[1523]: enP4978s1: Link UP Feb 12 19:19:29.360462 systemd-networkd[1523]: enP4978s1: Gained carrier Feb 12 19:19:29.361351 systemd-networkd[1523]: eth0: Link UP Feb 12 19:19:29.361363 systemd-networkd[1523]: eth0: Gained carrier Feb 12 19:19:29.361666 systemd-networkd[1523]: lo: Link UP Feb 12 19:19:29.361676 systemd-networkd[1523]: lo: Gained carrier Feb 12 19:19:29.361988 systemd-networkd[1523]: eth0: Gained IPv6LL Feb 12 19:19:29.362195 systemd-networkd[1523]: Enumeration completed Feb 12 19:19:29.362339 systemd[1]: Started systemd-networkd.service. Feb 12 19:19:29.362777 systemd-networkd[1523]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:19:29.364110 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:19:29.370971 waagent[1473]: 2024-02-12T19:19:29.370822Z INFO Daemon Daemon Create user account if not exists Feb 12 19:19:29.376782 waagent[1473]: 2024-02-12T19:19:29.376686Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:19:29.377789 systemd-networkd[1523]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:19:29.383900 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:19:29.384373 waagent[1473]: 2024-02-12T19:19:29.384271Z INFO Daemon Daemon Configure sudoer Feb 12 19:19:29.389999 waagent[1473]: 2024-02-12T19:19:29.389918Z INFO Daemon Daemon Configure sshd Feb 12 19:19:29.394560 waagent[1473]: 2024-02-12T19:19:29.394487Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:19:30.664519 waagent[1473]: 2024-02-12T19:19:30.664448Z INFO Daemon Daemon Provisioning complete Feb 12 19:19:30.684702 waagent[1473]: 2024-02-12T19:19:30.684635Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:19:30.691175 waagent[1473]: 2024-02-12T19:19:30.691095Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:19:30.701868 waagent[1473]: 2024-02-12T19:19:30.701791Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:19:31.006222 waagent[1532]: 2024-02-12T19:19:31.006072Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:19:31.007313 waagent[1532]: 2024-02-12T19:19:31.007253Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:31.007561 waagent[1532]: 2024-02-12T19:19:31.007514Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:31.020412 waagent[1532]: 2024-02-12T19:19:31.020332Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:19:31.020771 waagent[1532]: 2024-02-12T19:19:31.020692Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:19:31.090013 waagent[1532]: 2024-02-12T19:19:31.089878Z INFO ExtHandler ExtHandler Found private key matching thumbprint 013833255CEAD4F6F95DC2953C79D76C16C3F3EF Feb 12 19:19:31.090362 waagent[1532]: 2024-02-12T19:19:31.090311Z INFO ExtHandler ExtHandler Certificate with thumbprint 481B891B72514AAEE89BF9797568C62936838F92 has no matching private key. Feb 12 19:19:31.090680 waagent[1532]: 2024-02-12T19:19:31.090633Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:19:31.641368 waagent[1532]: 2024-02-12T19:19:31.641314Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 9993b966-7cf8-46e0-889a-434b57953dd6 New eTag: 3942351761466204126] Feb 12 19:19:31.642259 waagent[1532]: 2024-02-12T19:19:31.642195Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:19:31.757994 waagent[1532]: 2024-02-12T19:19:31.757842Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:19:31.768752 waagent[1532]: 2024-02-12T19:19:31.768645Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1532 Feb 12 19:19:31.772794 waagent[1532]: 2024-02-12T19:19:31.772695Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:19:31.774298 waagent[1532]: 2024-02-12T19:19:31.774238Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:19:32.466937 waagent[1532]: 2024-02-12T19:19:32.466878Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:19:32.469806 waagent[1532]: 2024-02-12T19:19:32.469739Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:19:32.477567 waagent[1532]: 2024-02-12T19:19:32.477506Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:19:32.478243 waagent[1532]: 2024-02-12T19:19:32.478187Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:19:32.479512 waagent[1532]: 2024-02-12T19:19:32.479450Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:19:32.481142 waagent[1532]: 2024-02-12T19:19:32.481071Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:19:32.481408 waagent[1532]: 2024-02-12T19:19:32.481338Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:32.481963 waagent[1532]: 2024-02-12T19:19:32.481891Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:32.482537 waagent[1532]: 2024-02-12T19:19:32.482472Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:19:32.483191 waagent[1532]: 2024-02-12T19:19:32.483125Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:19:32.483382 waagent[1532]: 2024-02-12T19:19:32.483315Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:19:32.483382 waagent[1532]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:19:32.483382 waagent[1532]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:19:32.483382 waagent[1532]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:19:32.483382 waagent[1532]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:32.483382 waagent[1532]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:32.483382 waagent[1532]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:32.485528 waagent[1532]: 2024-02-12T19:19:32.485336Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:19:32.486308 waagent[1532]: 2024-02-12T19:19:32.486233Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:32.486527 waagent[1532]: 2024-02-12T19:19:32.486462Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:19:32.487283 waagent[1532]: 2024-02-12T19:19:32.487200Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:19:32.487807 waagent[1532]: 2024-02-12T19:19:32.487740Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:32.487926 waagent[1532]: 2024-02-12T19:19:32.487872Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:19:32.488223 waagent[1532]: 2024-02-12T19:19:32.488141Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:19:32.489595 waagent[1532]: 2024-02-12T19:19:32.489518Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:19:32.492731 waagent[1532]: 2024-02-12T19:19:32.492653Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:19:32.494206 waagent[1532]: 2024-02-12T19:19:32.494139Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:19:32.502931 waagent[1532]: 2024-02-12T19:19:32.502870Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:19:32.503692 waagent[1532]: 2024-02-12T19:19:32.503645Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:19:32.504773 waagent[1532]: 2024-02-12T19:19:32.504701Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:19:32.555035 waagent[1532]: 2024-02-12T19:19:32.554899Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1523' Feb 12 19:19:32.729046 waagent[1532]: 2024-02-12T19:19:32.728865Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:19:32.729046 waagent[1532]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:19:32.729046 waagent[1532]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:19:32.729046 waagent[1532]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:35:70 brd ff:ff:ff:ff:ff:ff Feb 12 19:19:32.729046 waagent[1532]: 3: enP4978s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:35:70 brd ff:ff:ff:ff:ff:ff\ altname enP4978p0s2 Feb 12 19:19:32.729046 waagent[1532]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:19:32.729046 waagent[1532]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:19:32.729046 waagent[1532]: 2: eth0 inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:19:32.729046 waagent[1532]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:19:32.729046 waagent[1532]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:19:32.729046 waagent[1532]: 2: eth0 inet6 fe80::20d:3aff:fefb:3570/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:19:32.844869 waagent[1532]: 2024-02-12T19:19:32.844797Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:19:33.174607 waagent[1532]: 2024-02-12T19:19:33.174460Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:19:33.177546 waagent[1532]: 2024-02-12T19:19:33.177421Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:19:33.177546 waagent[1532]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:33.177546 waagent[1532]: pkts bytes target prot opt in out source destination Feb 12 19:19:33.177546 waagent[1532]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:33.177546 waagent[1532]: pkts bytes target prot opt in out source destination Feb 12 19:19:33.177546 waagent[1532]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:33.177546 waagent[1532]: pkts bytes target prot opt in out source destination Feb 12 19:19:33.177546 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:19:33.177546 waagent[1532]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:19:33.179064 waagent[1532]: 2024-02-12T19:19:33.179011Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:19:35.217402 waagent[1532]: 2024-02-12T19:19:35.217338Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:19:35.709302 waagent[1473]: 2024-02-12T19:19:35.709186Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:19:35.712966 waagent[1473]: 2024-02-12T19:19:35.712908Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:19:36.912870 waagent[1572]: 2024-02-12T19:19:36.912761Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:19:36.913949 waagent[1572]: 2024-02-12T19:19:36.913892Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:19:36.914181 waagent[1572]: 2024-02-12T19:19:36.914134Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:19:36.922572 waagent[1572]: 2024-02-12T19:19:36.922434Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:19:36.923214 waagent[1572]: 2024-02-12T19:19:36.923157Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:36.923459 waagent[1572]: 2024-02-12T19:19:36.923410Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:36.938389 waagent[1572]: 2024-02-12T19:19:36.938304Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:19:37.005990 waagent[1572]: 2024-02-12T19:19:37.005920Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:19:37.007303 waagent[1572]: 2024-02-12T19:19:37.007243Z INFO ExtHandler Feb 12 19:19:37.007577 waagent[1572]: 2024-02-12T19:19:37.007526Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 33669c43-0114-4d41-924a-beccebffd3f5 eTag: 3942351761466204126 source: Fabric] Feb 12 19:19:37.008460 waagent[1572]: 2024-02-12T19:19:37.008402Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:19:37.009808 waagent[1572]: 2024-02-12T19:19:37.009748Z INFO ExtHandler Feb 12 19:19:37.010042 waagent[1572]: 2024-02-12T19:19:37.009994Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:19:37.016881 waagent[1572]: 2024-02-12T19:19:37.016820Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:19:37.017574 waagent[1572]: 2024-02-12T19:19:37.017527Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:19:38.181555 waagent[1572]: 2024-02-12T19:19:38.181483Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:19:38.258476 waagent[1572]: 2024-02-12T19:19:38.258330Z INFO ExtHandler Downloaded certificate {'thumbprint': '481B891B72514AAEE89BF9797568C62936838F92', 'hasPrivateKey': False} Feb 12 19:19:38.259782 waagent[1572]: 2024-02-12T19:19:38.259695Z INFO ExtHandler Downloaded certificate {'thumbprint': '013833255CEAD4F6F95DC2953C79D76C16C3F3EF', 'hasPrivateKey': True} Feb 12 19:19:38.260960 waagent[1572]: 2024-02-12T19:19:38.260901Z INFO ExtHandler Fetch goal state completed Feb 12 19:19:38.286087 waagent[1572]: 2024-02-12T19:19:38.286006Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1572 Feb 12 19:19:38.289810 waagent[1572]: 2024-02-12T19:19:38.289731Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:19:38.291428 waagent[1572]: 2024-02-12T19:19:38.291366Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:19:38.296562 waagent[1572]: 2024-02-12T19:19:38.296507Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:19:38.297145 waagent[1572]: 2024-02-12T19:19:38.297089Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:19:38.305412 waagent[1572]: 2024-02-12T19:19:38.305352Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:19:38.306142 waagent[1572]: 2024-02-12T19:19:38.306084Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:19:38.426568 waagent[1572]: 2024-02-12T19:19:38.426434Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:19:38.429746 waagent[1572]: 2024-02-12T19:19:38.429614Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:19:38.433658 waagent[1572]: 2024-02-12T19:19:38.433560Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:19:38.435398 waagent[1572]: 2024-02-12T19:19:38.435327Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:19:38.435646 waagent[1572]: 2024-02-12T19:19:38.435576Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:38.436068 waagent[1572]: 2024-02-12T19:19:38.435994Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:38.437208 waagent[1572]: 2024-02-12T19:19:38.437123Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:19:38.437537 waagent[1572]: 2024-02-12T19:19:38.437473Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:19:38.437537 waagent[1572]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:19:38.437537 waagent[1572]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:19:38.437537 waagent[1572]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:19:38.437537 waagent[1572]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:38.437537 waagent[1572]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:38.437537 waagent[1572]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:38.439992 waagent[1572]: 2024-02-12T19:19:38.439866Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:19:38.440601 waagent[1572]: 2024-02-12T19:19:38.440529Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:38.441239 waagent[1572]: 2024-02-12T19:19:38.441182Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:38.441239 waagent[1572]: 2024-02-12T19:19:38.441035Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:19:38.441446 waagent[1572]: 2024-02-12T19:19:38.441377Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:19:38.442316 waagent[1572]: 2024-02-12T19:19:38.442230Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:19:38.442784 waagent[1572]: 2024-02-12T19:19:38.442720Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:19:38.442918 waagent[1572]: 2024-02-12T19:19:38.442870Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:19:38.445908 waagent[1572]: 2024-02-12T19:19:38.445778Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:19:38.446078 waagent[1572]: 2024-02-12T19:19:38.445986Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:19:38.446614 waagent[1572]: 2024-02-12T19:19:38.446531Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:19:38.467054 waagent[1572]: 2024-02-12T19:19:38.466657Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:19:38.475977 waagent[1572]: 2024-02-12T19:19:38.475893Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:19:38.478488 waagent[1572]: 2024-02-12T19:19:38.478414Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:19:38.478488 waagent[1572]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:19:38.478488 waagent[1572]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:19:38.478488 waagent[1572]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:35:70 brd ff:ff:ff:ff:ff:ff Feb 12 19:19:38.478488 waagent[1572]: 3: enP4978s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:35:70 brd ff:ff:ff:ff:ff:ff\ altname enP4978p0s2 Feb 12 19:19:38.478488 waagent[1572]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:19:38.478488 waagent[1572]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:19:38.478488 waagent[1572]: 2: eth0 inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:19:38.478488 waagent[1572]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:19:38.478488 waagent[1572]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:19:38.478488 waagent[1572]: 2: eth0 inet6 fe80::20d:3aff:fefb:3570/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:19:38.580612 waagent[1572]: 2024-02-12T19:19:38.580474Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:19:38.580612 waagent[1572]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:38.580612 waagent[1572]: pkts bytes target prot opt in out source destination Feb 12 19:19:38.580612 waagent[1572]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:38.580612 waagent[1572]: pkts bytes target prot opt in out source destination Feb 12 19:19:38.580612 waagent[1572]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:38.580612 waagent[1572]: pkts bytes target prot opt in out source destination Feb 12 19:19:38.580612 waagent[1572]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:19:38.580612 waagent[1572]: 107 12452 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:19:38.580612 waagent[1572]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:19:39.404044 waagent[1572]: 2024-02-12T19:19:39.403988Z INFO ExtHandler ExtHandler Feb 12 19:19:39.404343 waagent[1572]: 2024-02-12T19:19:39.404157Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: dc58ffe1-43ff-490d-9646-be378c79d859 correlation c6b3156a-687e-4924-9127-2934e00f9431 created: 2024-02-12T19:17:30.227188Z] Feb 12 19:19:39.405164 waagent[1572]: 2024-02-12T19:19:39.405088Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:19:39.407031 waagent[1572]: 2024-02-12T19:19:39.406969Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 2 ms] Feb 12 19:19:39.430518 waagent[1572]: 2024-02-12T19:19:39.430450Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:19:39.440538 waagent[1572]: 2024-02-12T19:19:39.440447Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 1C0D7163-FDE8-41CE-9131-7089D50D1224;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:19:51.929554 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:20:02.521564 update_engine[1368]: I0212 19:20:02.521198 1368 update_attempter.cc:509] Updating boot flags... Feb 12 19:20:07.276807 systemd[1]: Created slice system-sshd.slice. Feb 12 19:20:07.277908 systemd[1]: Started sshd@0-10.200.20.48:22-10.200.12.6:51944.service. Feb 12 19:20:07.968006 sshd[1677]: Accepted publickey for core from 10.200.12.6 port 51944 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:07.986816 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:07.990600 systemd-logind[1365]: New session 3 of user core. Feb 12 19:20:07.991403 systemd[1]: Started session-3.scope. Feb 12 19:20:08.319776 systemd[1]: Started sshd@1-10.200.20.48:22-10.200.12.6:51948.service. Feb 12 19:20:08.720862 sshd[1682]: Accepted publickey for core from 10.200.12.6 port 51948 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:08.722399 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:08.725757 systemd-logind[1365]: New session 4 of user core. Feb 12 19:20:08.726287 systemd[1]: Started session-4.scope. Feb 12 19:20:09.012016 sshd[1682]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:09.014964 systemd-logind[1365]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:20:09.015124 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:20:09.015846 systemd[1]: sshd@1-10.200.20.48:22-10.200.12.6:51948.service: Deactivated successfully. Feb 12 19:20:09.016926 systemd-logind[1365]: Removed session 4. Feb 12 19:20:09.079612 systemd[1]: Started sshd@2-10.200.20.48:22-10.200.12.6:51952.service. Feb 12 19:20:09.482025 sshd[1688]: Accepted publickey for core from 10.200.12.6 port 51952 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:09.483560 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:09.487513 systemd[1]: Started session-5.scope. Feb 12 19:20:09.488144 systemd-logind[1365]: New session 5 of user core. Feb 12 19:20:09.772178 sshd[1688]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:09.774842 systemd[1]: sshd@2-10.200.20.48:22-10.200.12.6:51952.service: Deactivated successfully. Feb 12 19:20:09.775483 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:20:09.775983 systemd-logind[1365]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:20:09.776683 systemd-logind[1365]: Removed session 5. Feb 12 19:20:09.838890 systemd[1]: Started sshd@3-10.200.20.48:22-10.200.12.6:51962.service. Feb 12 19:20:10.241630 sshd[1694]: Accepted publickey for core from 10.200.12.6 port 51962 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:10.243239 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:10.246885 systemd-logind[1365]: New session 6 of user core. Feb 12 19:20:10.247331 systemd[1]: Started session-6.scope. Feb 12 19:20:10.535303 sshd[1694]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:10.537661 systemd[1]: sshd@3-10.200.20.48:22-10.200.12.6:51962.service: Deactivated successfully. Feb 12 19:20:10.538346 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:20:10.538917 systemd-logind[1365]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:20:10.539743 systemd-logind[1365]: Removed session 6. Feb 12 19:20:10.607485 systemd[1]: Started sshd@4-10.200.20.48:22-10.200.12.6:51968.service. Feb 12 19:20:11.041826 sshd[1700]: Accepted publickey for core from 10.200.12.6 port 51968 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:11.043056 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:11.046696 systemd-logind[1365]: New session 7 of user core. Feb 12 19:20:11.047175 systemd[1]: Started session-7.scope. Feb 12 19:20:11.615523 sudo[1703]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:20:11.615746 sudo[1703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:20:11.689896 dbus-daemon[1351]: avc: received setenforce notice (enforcing=1) Feb 12 19:20:11.691647 sudo[1703]: pam_unix(sudo:session): session closed for user root Feb 12 19:20:11.786196 sshd[1700]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:11.789221 systemd[1]: sshd@4-10.200.20.48:22-10.200.12.6:51968.service: Deactivated successfully. Feb 12 19:20:11.790051 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:20:11.790641 systemd-logind[1365]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:20:11.791494 systemd-logind[1365]: Removed session 7. Feb 12 19:20:11.864154 systemd[1]: Started sshd@5-10.200.20.48:22-10.200.12.6:51980.service. Feb 12 19:20:12.299041 sshd[1707]: Accepted publickey for core from 10.200.12.6 port 51980 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:12.300752 sshd[1707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:12.304974 systemd[1]: Started session-8.scope. Feb 12 19:20:12.305530 systemd-logind[1365]: New session 8 of user core. Feb 12 19:20:12.545643 sudo[1711]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:20:12.546185 sudo[1711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:20:12.548894 sudo[1711]: pam_unix(sudo:session): session closed for user root Feb 12 19:20:12.553556 sudo[1710]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:20:12.553811 sudo[1710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:20:12.562623 systemd[1]: Stopping audit-rules.service... Feb 12 19:20:12.563000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:20:12.569227 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:20:12.569285 kernel: audit: type=1305 audit(1707765612.563:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:20:12.569531 auditctl[1714]: No rules Feb 12 19:20:12.570015 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:20:12.570196 systemd[1]: Stopped audit-rules.service. Feb 12 19:20:12.571779 systemd[1]: Starting audit-rules.service... Feb 12 19:20:12.563000 audit[1714]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8f231d0 a2=420 a3=0 items=0 ppid=1 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.605160 kernel: audit: type=1300 audit(1707765612.563:177): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8f231d0 a2=420 a3=0 items=0 ppid=1 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.563000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:20:12.613541 kernel: audit: type=1327 audit(1707765612.563:177): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:20:12.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.621997 augenrules[1731]: No rules Feb 12 19:20:12.622947 systemd[1]: Finished audit-rules.service. Feb 12 19:20:12.630940 kernel: audit: type=1131 audit(1707765612.568:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.631810 sudo[1710]: pam_unix(sudo:session): session closed for user root Feb 12 19:20:12.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.649090 kernel: audit: type=1130 audit(1707765612.619:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.631000 audit[1710]: USER_END pid=1710 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.668538 kernel: audit: type=1106 audit(1707765612.631:180): pid=1710 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.631000 audit[1710]: CRED_DISP pid=1710 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.686456 kernel: audit: type=1104 audit(1707765612.631:181): pid=1710 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.716560 sshd[1707]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:12.716000 audit[1707]: USER_END pid=1707 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:12.741577 systemd[1]: sshd@5-10.200.20.48:22-10.200.12.6:51980.service: Deactivated successfully. Feb 12 19:20:12.716000 audit[1707]: CRED_DISP pid=1707 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:12.761519 kernel: audit: type=1106 audit(1707765612.716:182): pid=1707 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:12.761620 kernel: audit: type=1104 audit(1707765612.716:183): pid=1707 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:12.742348 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:20:12.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.48:22-10.200.12.6:51980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.762198 systemd-logind[1365]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:20:12.780715 kernel: audit: type=1131 audit(1707765612.741:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.48:22-10.200.12.6:51980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.783796 systemd-logind[1365]: Removed session 8. Feb 12 19:20:12.785112 systemd[1]: Started sshd@6-10.200.20.48:22-10.200.12.6:51994.service. Feb 12 19:20:12.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.12.6:51994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:13.187000 audit[1737]: USER_ACCT pid=1737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:13.188393 sshd[1737]: Accepted publickey for core from 10.200.12.6 port 51994 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:13.188000 audit[1737]: CRED_ACQ pid=1737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:13.188000 audit[1737]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef1e4c10 a2=3 a3=1 items=0 ppid=1 pid=1737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:13.190379 sshd[1737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:13.194154 systemd-logind[1365]: New session 9 of user core. Feb 12 19:20:13.194580 systemd[1]: Started session-9.scope. Feb 12 19:20:13.198000 audit[1737]: USER_START pid=1737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:13.199000 audit[1739]: CRED_ACQ pid=1739 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:13.418000 audit[1740]: USER_ACCT pid=1740 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:13.418000 audit[1740]: CRED_REFR pid=1740 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:13.419209 sudo[1740]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:20:13.419404 sudo[1740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:20:13.420000 audit[1740]: USER_START pid=1740 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:14.119653 systemd[1]: Reloading. Feb 12 19:20:14.188884 /usr/lib/systemd/system-generators/torcx-generator[1770]: time="2024-02-12T19:20:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:20:14.188915 /usr/lib/systemd/system-generators/torcx-generator[1770]: time="2024-02-12T19:20:14Z" level=info msg="torcx already run" Feb 12 19:20:14.247405 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:20:14.247690 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:20:14.262968 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit: BPF prog-id=38 op=LOAD Feb 12 19:20:14.332000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit: BPF prog-id=39 op=LOAD Feb 12 19:20:14.333000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit: BPF prog-id=40 op=LOAD Feb 12 19:20:14.334000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit: BPF prog-id=41 op=LOAD Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.335000 audit: BPF prog-id=42 op=LOAD Feb 12 19:20:14.335000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:20:14.335000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.336000 audit: BPF prog-id=43 op=LOAD Feb 12 19:20:14.336000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:20:14.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit: BPF prog-id=44 op=LOAD Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.337000 audit: BPF prog-id=45 op=LOAD Feb 12 19:20:14.337000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:20:14.337000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:20:14.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit: BPF prog-id=46 op=LOAD Feb 12 19:20:14.339000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.340000 audit: BPF prog-id=47 op=LOAD Feb 12 19:20:14.340000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.341000 audit: BPF prog-id=48 op=LOAD Feb 12 19:20:14.342000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit: BPF prog-id=49 op=LOAD Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.342000 audit: BPF prog-id=50 op=LOAD Feb 12 19:20:14.343000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:20:14.343000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit: BPF prog-id=51 op=LOAD Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:14.344000 audit: BPF prog-id=52 op=LOAD Feb 12 19:20:14.345000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:20:14.345000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:20:14.360871 systemd[1]: Started kubelet.service. Feb 12 19:20:14.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:14.371503 systemd[1]: Starting coreos-metadata.service... Feb 12 19:20:14.413104 kubelet[1828]: E0212 19:20:14.413035 1828 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:20:14.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:20:14.415269 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:20:14.415391 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:20:14.423235 coreos-metadata[1836]: Feb 12 19:20:14.423 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:20:14.428435 coreos-metadata[1836]: Feb 12 19:20:14.428 INFO Fetch successful Feb 12 19:20:14.428435 coreos-metadata[1836]: Feb 12 19:20:14.428 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 12 19:20:14.430487 coreos-metadata[1836]: Feb 12 19:20:14.430 INFO Fetch successful Feb 12 19:20:14.430630 coreos-metadata[1836]: Feb 12 19:20:14.430 INFO Fetching http://168.63.129.16/machine/502c005a-1b16-45e2-8ec2-eaabc3f786d8/a2b1c99f%2Db899%2D4e91%2D85c6%2D93aeb823b965.%5Fci%2D3510.3.2%2Da%2D6e8117160a?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 12 19:20:14.432202 coreos-metadata[1836]: Feb 12 19:20:14.432 INFO Fetch successful Feb 12 19:20:14.465553 coreos-metadata[1836]: Feb 12 19:20:14.465 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:20:14.478754 coreos-metadata[1836]: Feb 12 19:20:14.478 INFO Fetch successful Feb 12 19:20:14.487428 systemd[1]: Finished coreos-metadata.service. Feb 12 19:20:14.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.114807 systemd[1]: Stopped kubelet.service. Feb 12 19:20:18.118950 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 12 19:20:18.119017 kernel: audit: type=1130 audit(1707765618.113:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.145840 systemd[1]: Reloading. Feb 12 19:20:18.152125 kernel: audit: type=1131 audit(1707765618.113:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.229599 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2024-02-12T19:20:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:20:18.229632 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2024-02-12T19:20:18Z" level=info msg="torcx already run" Feb 12 19:20:18.290985 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:20:18.291003 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:20:18.306119 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.409190 kernel: audit: type=1400 audit(1707765618.371:371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.409265 kernel: audit: type=1400 audit(1707765618.371:372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.409304 kernel: audit: type=1400 audit(1707765618.371:373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.445817 kernel: audit: type=1400 audit(1707765618.371:374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.466416 kernel: audit: type=1400 audit(1707765618.371:375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.466520 kernel: audit: type=1400 audit(1707765618.371:376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.490471 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:20:18.490575 kernel: audit: type=1400 audit(1707765618.371:377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit: BPF prog-id=53 op=LOAD Feb 12 19:20:18.390000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit: BPF prog-id=54 op=LOAD Feb 12 19:20:18.408000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit: BPF prog-id=55 op=LOAD Feb 12 19:20:18.427000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit: BPF prog-id=56 op=LOAD Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit: BPF prog-id=57 op=LOAD Feb 12 19:20:18.444000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:20:18.444000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.465000 audit: BPF prog-id=58 op=LOAD Feb 12 19:20:18.465000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:20:18.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.508000 audit: BPF prog-id=60 op=LOAD Feb 12 19:20:18.509000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:20:18.509000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.510000 audit: BPF prog-id=61 op=LOAD Feb 12 19:20:18.511000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.512000 audit: BPF prog-id=62 op=LOAD Feb 12 19:20:18.512000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit: BPF prog-id=63 op=LOAD Feb 12 19:20:18.513000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit: BPF prog-id=64 op=LOAD Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.514000 audit: BPF prog-id=65 op=LOAD Feb 12 19:20:18.514000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:20:18.514000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit: BPF prog-id=66 op=LOAD Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.516000 audit: BPF prog-id=67 op=LOAD Feb 12 19:20:18.516000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:20:18.516000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:20:18.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:18.543530 systemd[1]: Started kubelet.service. Feb 12 19:20:18.585162 kubelet[1953]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:20:18.585162 kubelet[1953]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:20:18.585162 kubelet[1953]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:20:18.585457 kubelet[1953]: I0212 19:20:18.585207 1953 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:20:19.148943 kubelet[1953]: I0212 19:20:19.148908 1953 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:20:19.148943 kubelet[1953]: I0212 19:20:19.148940 1953 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:20:19.149181 kubelet[1953]: I0212 19:20:19.149159 1953 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:20:19.153032 kubelet[1953]: W0212 19:20:19.153007 1953 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:20:19.153485 kubelet[1953]: I0212 19:20:19.153462 1953 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:20:19.153668 kubelet[1953]: I0212 19:20:19.153648 1953 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:20:19.153751 kubelet[1953]: I0212 19:20:19.153735 1953 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:20:19.153851 kubelet[1953]: I0212 19:20:19.153757 1953 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:20:19.153851 kubelet[1953]: I0212 19:20:19.153767 1953 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:20:19.153901 kubelet[1953]: I0212 19:20:19.153856 1953 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:20:19.154120 kubelet[1953]: I0212 19:20:19.154105 1953 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:20:19.156755 kubelet[1953]: I0212 19:20:19.156730 1953 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:20:19.156755 kubelet[1953]: I0212 19:20:19.156756 1953 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:20:19.156853 kubelet[1953]: I0212 19:20:19.156784 1953 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:20:19.156853 kubelet[1953]: I0212 19:20:19.156797 1953 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:20:19.157239 kubelet[1953]: E0212 19:20:19.157223 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:19.157511 kubelet[1953]: E0212 19:20:19.157497 1953 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:19.157785 kubelet[1953]: I0212 19:20:19.157774 1953 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:20:19.158141 kubelet[1953]: W0212 19:20:19.158128 1953 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:20:19.158685 kubelet[1953]: I0212 19:20:19.158671 1953 server.go:1168] "Started kubelet" Feb 12 19:20:19.159035 kubelet[1953]: I0212 19:20:19.159012 1953 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:20:19.159121 kubelet[1953]: I0212 19:20:19.159107 1953 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:20:19.159625 kubelet[1953]: I0212 19:20:19.159587 1953 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:20:19.160455 kubelet[1953]: E0212 19:20:19.160439 1953 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:20:19.160535 kubelet[1953]: E0212 19:20:19.160526 1953 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:20:19.159000 audit[1953]: AVC avc: denied { mac_admin } for pid=1953 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:19.159000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:20:19.159000 audit[1953]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ca77d0 a1=400092b470 a2=4000ca77a0 a3=25 items=0 ppid=1 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.159000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:20:19.159000 audit[1953]: AVC avc: denied { mac_admin } for pid=1953 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:19.159000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:20:19.159000 audit[1953]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce0740 a1=400092b488 a2=4000ca7860 a3=25 items=0 ppid=1 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.159000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:20:19.161955 kubelet[1953]: I0212 19:20:19.161613 1953 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:20:19.161955 kubelet[1953]: I0212 19:20:19.161647 1953 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:20:19.161955 kubelet[1953]: I0212 19:20:19.161703 1953 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:20:19.163967 kubelet[1953]: E0212 19:20:19.163952 1953 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Feb 12 19:20:19.164068 kubelet[1953]: I0212 19:20:19.164058 1953 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:20:19.164212 kubelet[1953]: I0212 19:20:19.164200 1953 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:20:19.162000 audit[1963]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.162000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb92d250 a2=0 a3=1 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:20:19.163000 audit[1964]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.163000 audit[1964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffef2733b0 a2=0 a3=1 items=0 ppid=1953 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:20:19.165000 audit[1966]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.165000 audit[1966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdb299e20 a2=0 a3=1 items=0 ppid=1953 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:20:19.167000 audit[1968]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.167000 audit[1968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdf99c400 a2=0 a3=1 items=0 ppid=1953 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:20:19.192215 kubelet[1953]: W0212 19:20:19.192180 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:20:19.192296 kubelet[1953]: E0212 19:20:19.192222 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:20:19.192296 kubelet[1953]: E0212 19:20:19.192270 1953 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.48\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:20:19.192389 kubelet[1953]: W0212 19:20:19.192368 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:20:19.192389 kubelet[1953]: E0212 19:20:19.192390 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:20:19.192450 kubelet[1953]: W0212 19:20:19.192417 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:20:19.192450 kubelet[1953]: E0212 19:20:19.192431 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:20:19.192580 kubelet[1953]: E0212 19:20:19.192480 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c851938216", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 158647318, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 158647318, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.196840 kubelet[1953]: E0212 19:20:19.196762 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c851b003c8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 160515528, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 160515528, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.197522 kubelet[1953]: E0212 19:20:19.197442 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d6f5f5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196622325, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196622325, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.197714 kubelet[1953]: I0212 19:20:19.197661 1953 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:20:19.197714 kubelet[1953]: I0212 19:20:19.197679 1953 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:20:19.197714 kubelet[1953]: I0212 19:20:19.197695 1953 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:20:19.203070 kubelet[1953]: I0212 19:20:19.203045 1953 policy_none.go:49] "None policy: Start" Feb 12 19:20:19.203418 kubelet[1953]: E0212 19:20:19.203323 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7146c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196630124, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196630124, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.203911 kubelet[1953]: I0212 19:20:19.203872 1953 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:20:19.203971 kubelet[1953]: I0212 19:20:19.203921 1953 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:20:19.208350 kubelet[1953]: E0212 19:20:19.208279 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7236c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196633964, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196633964, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.212435 systemd[1]: Created slice kubepods.slice. Feb 12 19:20:19.216369 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:20:19.224929 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:20:19.227652 kubelet[1953]: I0212 19:20:19.227623 1953 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:20:19.226000 audit[1953]: AVC avc: denied { mac_admin } for pid=1953 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:19.226000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:20:19.226000 audit[1953]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005e0a20 a1=400060eee8 a2=40005e09f0 a3=25 items=0 ppid=1 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.226000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:20:19.228930 kubelet[1953]: I0212 19:20:19.228914 1953 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:20:19.229199 kubelet[1953]: I0212 19:20:19.229188 1953 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:20:19.229742 kubelet[1953]: E0212 19:20:19.229722 1953 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.48\" not found" Feb 12 19:20:19.237206 kubelet[1953]: E0212 19:20:19.237117 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c856342ba9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 236285353, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 236285353, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.246000 audit[1975]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.246000 audit[1975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff8c49280 a2=0 a3=1 items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:20:19.248120 kubelet[1953]: I0212 19:20:19.248103 1953 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:20:19.247000 audit[1977]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.247000 audit[1977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffd54010 a2=0 a3=1 items=0 ppid=1953 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:20:19.248000 audit[1978]: NETFILTER_CFG table=mangle:12 family=10 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:19.248000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdbd62b80 a2=0 a3=1 items=0 ppid=1953 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:20:19.250236 kubelet[1953]: I0212 19:20:19.250209 1953 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:20:19.250291 kubelet[1953]: I0212 19:20:19.250246 1953 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:20:19.250291 kubelet[1953]: I0212 19:20:19.250265 1953 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:20:19.250332 kubelet[1953]: E0212 19:20:19.250305 1953 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:20:19.248000 audit[1979]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.248000 audit[1979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc74e2980 a2=0 a3=1 items=0 ppid=1953 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:20:19.251489 kubelet[1953]: W0212 19:20:19.251452 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:20:19.251489 kubelet[1953]: E0212 19:20:19.251488 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:20:19.250000 audit[1980]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:19.250000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed4af1a0 a2=0 a3=1 items=0 ppid=1953 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:20:19.251000 audit[1981]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:19.251000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd78c030 a2=0 a3=1 items=0 ppid=1953 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:20:19.251000 audit[1982]: NETFILTER_CFG table=nat:16 family=10 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:19.251000 audit[1982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe561fb70 a2=0 a3=1 items=0 ppid=1953 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:20:19.252000 audit[1983]: NETFILTER_CFG table=filter:17 family=10 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:19.252000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcd418c10 a2=0 a3=1 items=0 ppid=1953 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:19.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:20:19.265484 kubelet[1953]: I0212 19:20:19.265459 1953 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.48" Feb 12 19:20:19.266468 kubelet[1953]: E0212 19:20:19.266450 1953 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.48" Feb 12 19:20:19.266916 kubelet[1953]: E0212 19:20:19.266843 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d6f5f5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196622325, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 265413200, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d6f5f5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.267636 kubelet[1953]: E0212 19:20:19.267579 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7146c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196630124, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 265425960, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7146c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.269379 kubelet[1953]: E0212 19:20:19.269318 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7236c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196633964, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 265432639, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7236c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.394376 kubelet[1953]: E0212 19:20:19.394346 1953 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.48\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:20:19.469524 kubelet[1953]: I0212 19:20:19.467358 1953 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.48" Feb 12 19:20:19.469524 kubelet[1953]: E0212 19:20:19.468771 1953 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.48" Feb 12 19:20:19.469524 kubelet[1953]: E0212 19:20:19.469027 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d6f5f5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196622325, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 467321769, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d6f5f5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.470181 kubelet[1953]: E0212 19:20:19.470124 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7146c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196630124, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 467331728, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7146c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.471129 kubelet[1953]: E0212 19:20:19.471077 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7236c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196633964, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 467335368, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7236c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.795480 kubelet[1953]: E0212 19:20:19.795378 1953 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.48\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:20:19.870378 kubelet[1953]: I0212 19:20:19.870355 1953 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.48" Feb 12 19:20:19.871480 kubelet[1953]: E0212 19:20:19.871460 1953 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.48" Feb 12 19:20:19.871673 kubelet[1953]: E0212 19:20:19.871607 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d6f5f5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196622325, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 870319435, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d6f5f5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.872833 kubelet[1953]: E0212 19:20:19.872777 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7146c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196630124, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 870325155, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7146c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:19.873778 kubelet[1953]: E0212 19:20:19.873725 1953 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48.17b333c853d7236c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.48", UID:"10.200.20.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.48"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 196633964, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 20, 19, 870328394, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.48.17b333c853d7236c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:20:20.091911 kubelet[1953]: W0212 19:20:20.091789 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:20:20.091911 kubelet[1953]: E0212 19:20:20.091843 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:20:20.118861 kubelet[1953]: W0212 19:20:20.118837 1953 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:20:20.119017 kubelet[1953]: E0212 19:20:20.119006 1953 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:20:20.154900 kubelet[1953]: I0212 19:20:20.154876 1953 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:20:20.158059 kubelet[1953]: E0212 19:20:20.158037 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:20.540412 kubelet[1953]: E0212 19:20:20.540384 1953 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.48" not found Feb 12 19:20:20.598952 kubelet[1953]: E0212 19:20:20.598920 1953 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.48\" not found" node="10.200.20.48" Feb 12 19:20:20.672764 kubelet[1953]: I0212 19:20:20.672739 1953 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.48" Feb 12 19:20:20.676062 kubelet[1953]: I0212 19:20:20.676037 1953 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.48" Feb 12 19:20:20.788688 kubelet[1953]: I0212 19:20:20.788664 1953 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:20:20.789244 env[1379]: time="2024-02-12T19:20:20.789151092Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:20:20.789675 kubelet[1953]: I0212 19:20:20.789660 1953 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:20:21.060000 audit[1740]: USER_END pid=1740 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:21.060000 audit[1740]: CRED_DISP pid=1740 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:21.061798 sudo[1740]: pam_unix(sudo:session): session closed for user root Feb 12 19:20:21.124540 sshd[1737]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:21.124000 audit[1737]: USER_END pid=1737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.124000 audit[1737]: CRED_DISP pid=1737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.126994 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:20:21.127735 systemd-logind[1365]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:20:21.127845 systemd[1]: sshd@6-10.200.20.48:22-10.200.12.6:51994.service: Deactivated successfully. Feb 12 19:20:21.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.12.6:51994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:21.128956 systemd-logind[1365]: Removed session 9. Feb 12 19:20:21.158122 kubelet[1953]: I0212 19:20:21.158087 1953 apiserver.go:52] "Watching apiserver" Feb 12 19:20:21.158871 kubelet[1953]: E0212 19:20:21.158823 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:21.161028 kubelet[1953]: I0212 19:20:21.161010 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:20:21.161240 kubelet[1953]: I0212 19:20:21.161227 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:20:21.161358 kubelet[1953]: I0212 19:20:21.161347 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:20:21.162374 kubelet[1953]: E0212 19:20:21.162347 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:21.165504 kubelet[1953]: I0212 19:20:21.165471 1953 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:20:21.166635 systemd[1]: Created slice kubepods-besteffort-pod71d7a803_9799_4ac5_96cf_e4e27dc91f1d.slice. Feb 12 19:20:21.174452 kubelet[1953]: I0212 19:20:21.174424 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-var-run-calico\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.174615 kubelet[1953]: I0212 19:20:21.174604 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-var-lib-calico\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.174727 kubelet[1953]: I0212 19:20:21.174696 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a3821f86-0264-4168-9734-5e7323fa14b3-varrun\") pod \"csi-node-driver-59xtq\" (UID: \"a3821f86-0264-4168-9734-5e7323fa14b3\") " pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:21.174835 kubelet[1953]: I0212 19:20:21.174825 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/71d7a803-9799-4ac5-96cf-e4e27dc91f1d-kube-proxy\") pod \"kube-proxy-dhcgn\" (UID: \"71d7a803-9799-4ac5-96cf-e4e27dc91f1d\") " pod="kube-system/kube-proxy-dhcgn" Feb 12 19:20:21.174921 kubelet[1953]: I0212 19:20:21.174912 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/71d7a803-9799-4ac5-96cf-e4e27dc91f1d-xtables-lock\") pod \"kube-proxy-dhcgn\" (UID: \"71d7a803-9799-4ac5-96cf-e4e27dc91f1d\") " pod="kube-system/kube-proxy-dhcgn" Feb 12 19:20:21.174992 kubelet[1953]: I0212 19:20:21.174982 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-94qmz\" (UniqueName: \"kubernetes.io/projected/71d7a803-9799-4ac5-96cf-e4e27dc91f1d-kube-api-access-94qmz\") pod \"kube-proxy-dhcgn\" (UID: \"71d7a803-9799-4ac5-96cf-e4e27dc91f1d\") " pod="kube-system/kube-proxy-dhcgn" Feb 12 19:20:21.175067 kubelet[1953]: I0212 19:20:21.175058 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-lib-modules\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175175 kubelet[1953]: I0212 19:20:21.175164 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-cni-net-dir\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175259 kubelet[1953]: I0212 19:20:21.175250 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-cni-log-dir\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175328 kubelet[1953]: I0212 19:20:21.175319 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-flexvol-driver-host\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175403 kubelet[1953]: I0212 19:20:21.175394 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7n5jq\" (UniqueName: \"kubernetes.io/projected/30cca6dd-f219-43e2-a0b3-ed2e243e5554-kube-api-access-7n5jq\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175474 kubelet[1953]: I0212 19:20:21.175465 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-df6t6\" (UniqueName: \"kubernetes.io/projected/a3821f86-0264-4168-9734-5e7323fa14b3-kube-api-access-df6t6\") pod \"csi-node-driver-59xtq\" (UID: \"a3821f86-0264-4168-9734-5e7323fa14b3\") " pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:21.175540 kubelet[1953]: I0212 19:20:21.175531 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30cca6dd-f219-43e2-a0b3-ed2e243e5554-tigera-ca-bundle\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175617 kubelet[1953]: I0212 19:20:21.175608 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-cni-bin-dir\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.175683 kubelet[1953]: I0212 19:20:21.175674 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a3821f86-0264-4168-9734-5e7323fa14b3-kubelet-dir\") pod \"csi-node-driver-59xtq\" (UID: \"a3821f86-0264-4168-9734-5e7323fa14b3\") " pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:21.175798 kubelet[1953]: I0212 19:20:21.175782 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a3821f86-0264-4168-9734-5e7323fa14b3-socket-dir\") pod \"csi-node-driver-59xtq\" (UID: \"a3821f86-0264-4168-9734-5e7323fa14b3\") " pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:21.175889 kubelet[1953]: I0212 19:20:21.175878 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a3821f86-0264-4168-9734-5e7323fa14b3-registration-dir\") pod \"csi-node-driver-59xtq\" (UID: \"a3821f86-0264-4168-9734-5e7323fa14b3\") " pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:21.175965 kubelet[1953]: I0212 19:20:21.175955 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/71d7a803-9799-4ac5-96cf-e4e27dc91f1d-lib-modules\") pod \"kube-proxy-dhcgn\" (UID: \"71d7a803-9799-4ac5-96cf-e4e27dc91f1d\") " pod="kube-system/kube-proxy-dhcgn" Feb 12 19:20:21.176037 kubelet[1953]: I0212 19:20:21.176028 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-xtables-lock\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.176157 kubelet[1953]: I0212 19:20:21.176098 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/30cca6dd-f219-43e2-a0b3-ed2e243e5554-policysync\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.176265 kubelet[1953]: I0212 19:20:21.176237 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/30cca6dd-f219-43e2-a0b3-ed2e243e5554-node-certs\") pod \"calico-node-n5dqh\" (UID: \"30cca6dd-f219-43e2-a0b3-ed2e243e5554\") " pod="calico-system/calico-node-n5dqh" Feb 12 19:20:21.176359 kubelet[1953]: I0212 19:20:21.176345 1953 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:20:21.180656 systemd[1]: Created slice kubepods-besteffort-pod30cca6dd_f219_43e2_a0b3_ed2e243e5554.slice. Feb 12 19:20:21.280047 kubelet[1953]: E0212 19:20:21.280018 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.280047 kubelet[1953]: W0212 19:20:21.280040 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.280192 kubelet[1953]: E0212 19:20:21.280064 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.280340 kubelet[1953]: E0212 19:20:21.280319 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.280340 kubelet[1953]: W0212 19:20:21.280335 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.280417 kubelet[1953]: E0212 19:20:21.280350 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.280546 kubelet[1953]: E0212 19:20:21.280528 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.280546 kubelet[1953]: W0212 19:20:21.280543 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.280628 kubelet[1953]: E0212 19:20:21.280555 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.284769 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286534 kubelet[1953]: W0212 19:20:21.284788 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.284811 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.284978 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286534 kubelet[1953]: W0212 19:20:21.284985 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.284998 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.285121 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286534 kubelet[1953]: W0212 19:20:21.285128 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.285139 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286534 kubelet[1953]: E0212 19:20:21.285246 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286823 kubelet[1953]: W0212 19:20:21.285252 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285301 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285379 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286823 kubelet[1953]: W0212 19:20:21.285385 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285435 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285505 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286823 kubelet[1953]: W0212 19:20:21.285521 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285572 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.286823 kubelet[1953]: E0212 19:20:21.285649 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.286823 kubelet[1953]: W0212 19:20:21.285655 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.285738 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.285814 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287022 kubelet[1953]: W0212 19:20:21.285820 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.285832 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.285945 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287022 kubelet[1953]: W0212 19:20:21.285951 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.285964 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.286072 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287022 kubelet[1953]: W0212 19:20:21.286078 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287022 kubelet[1953]: E0212 19:20:21.286088 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286218 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287211 kubelet[1953]: W0212 19:20:21.286225 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286238 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286349 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287211 kubelet[1953]: W0212 19:20:21.286355 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286366 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286478 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287211 kubelet[1953]: W0212 19:20:21.286484 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286493 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287211 kubelet[1953]: E0212 19:20:21.286615 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287397 kubelet[1953]: W0212 19:20:21.286621 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287397 kubelet[1953]: E0212 19:20:21.286633 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287397 kubelet[1953]: E0212 19:20:21.287170 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287397 kubelet[1953]: W0212 19:20:21.287180 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287397 kubelet[1953]: E0212 19:20:21.287235 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287397 kubelet[1953]: E0212 19:20:21.287317 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287397 kubelet[1953]: W0212 19:20:21.287322 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287397 kubelet[1953]: E0212 19:20:21.287332 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287544 kubelet[1953]: E0212 19:20:21.287431 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287544 kubelet[1953]: W0212 19:20:21.287437 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287544 kubelet[1953]: E0212 19:20:21.287446 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.287603 kubelet[1953]: E0212 19:20:21.287574 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.287603 kubelet[1953]: W0212 19:20:21.287580 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.287603 kubelet[1953]: E0212 19:20:21.287589 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.288680 kubelet[1953]: E0212 19:20:21.288665 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.288836 kubelet[1953]: W0212 19:20:21.288822 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.288895 kubelet[1953]: E0212 19:20:21.288886 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.308928 kubelet[1953]: E0212 19:20:21.308899 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.309054 kubelet[1953]: W0212 19:20:21.309039 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.309125 kubelet[1953]: E0212 19:20:21.309115 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.311667 kubelet[1953]: E0212 19:20:21.311450 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.311667 kubelet[1953]: W0212 19:20:21.311466 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.311667 kubelet[1953]: E0212 19:20:21.311482 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.312274 kubelet[1953]: E0212 19:20:21.312259 1953 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:21.312359 kubelet[1953]: W0212 19:20:21.312347 1953 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:21.312414 kubelet[1953]: E0212 19:20:21.312405 1953 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:21.480012 env[1379]: time="2024-02-12T19:20:21.479965077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dhcgn,Uid:71d7a803-9799-4ac5-96cf-e4e27dc91f1d,Namespace:kube-system,Attempt:0,}" Feb 12 19:20:21.485239 env[1379]: time="2024-02-12T19:20:21.485100832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5dqh,Uid:30cca6dd-f219-43e2-a0b3-ed2e243e5554,Namespace:calico-system,Attempt:0,}" Feb 12 19:20:22.159241 kubelet[1953]: E0212 19:20:22.159211 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:22.927630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount832656870.mount: Deactivated successfully. Feb 12 19:20:22.947664 env[1379]: time="2024-02-12T19:20:22.947620387Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.953067 env[1379]: time="2024-02-12T19:20:22.953033654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.964971 env[1379]: time="2024-02-12T19:20:22.964928250Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.967288 env[1379]: time="2024-02-12T19:20:22.967256884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.973822 env[1379]: time="2024-02-12T19:20:22.973784210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.980045 env[1379]: time="2024-02-12T19:20:22.980006433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.990092 env[1379]: time="2024-02-12T19:20:22.990059248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:22.993382 env[1379]: time="2024-02-12T19:20:22.993345470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:23.071197 env[1379]: time="2024-02-12T19:20:23.064697937Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:23.071197 env[1379]: time="2024-02-12T19:20:23.064768494Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:23.071197 env[1379]: time="2024-02-12T19:20:23.064779173Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:23.071197 env[1379]: time="2024-02-12T19:20:23.065258988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db6947cc64ab9740336ca952e184e2ad93aed1fc6c1bee58a0f99dda9aa2f755 pid=2023 runtime=io.containerd.runc.v2 Feb 12 19:20:23.071388 env[1379]: time="2024-02-12T19:20:23.067676300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:23.071388 env[1379]: time="2024-02-12T19:20:23.067749416Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:23.071388 env[1379]: time="2024-02-12T19:20:23.067760096Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:23.071388 env[1379]: time="2024-02-12T19:20:23.067918047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63 pid=2037 runtime=io.containerd.runc.v2 Feb 12 19:20:23.092899 systemd[1]: Started cri-containerd-621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63.scope. Feb 12 19:20:23.102660 systemd[1]: Started cri-containerd-db6947cc64ab9740336ca952e184e2ad93aed1fc6c1bee58a0f99dda9aa2f755.scope. Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.110000 audit: BPF prog-id=68 op=LOAD Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2037 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313831373836356237663166306637663866316365343036376662 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2037 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313831373836356237663166306637663866316365343036376662 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.111000 audit: BPF prog-id=69 op=LOAD Feb 12 19:20:23.111000 audit[2049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2037 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313831373836356237663166306637663866316365343036376662 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.112000 audit: BPF prog-id=70 op=LOAD Feb 12 19:20:23.112000 audit[2049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2037 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313831373836356237663166306637663866316365343036376662 Feb 12 19:20:23.113000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:20:23.113000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.113000 audit: BPF prog-id=71 op=LOAD Feb 12 19:20:23.113000 audit[2049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2037 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632313831373836356237663166306637663866316365343036376662 Feb 12 19:20:23.144604 kernel: kauditd_printk_skb: 289 callbacks suppressed Feb 12 19:20:23.144700 kernel: audit: type=1400 audit(1707765623.120:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.164801 kernel: audit: type=1400 audit(1707765623.120:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.164883 kubelet[1953]: E0212 19:20:23.164746 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.184776 kernel: audit: type=1400 audit(1707765623.120:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.206996 kernel: audit: type=1400 audit(1707765623.120:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.207103 env[1379]: time="2024-02-12T19:20:23.189556914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5dqh,Uid:30cca6dd-f219-43e2-a0b3-ed2e243e5554,Namespace:calico-system,Attempt:0,} returns sandbox id \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\"" Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.226862 kernel: audit: type=1400 audit(1707765623.120:579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.228848 env[1379]: time="2024-02-12T19:20:23.228813204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:20:23.245659 kernel: audit: type=1400 audit(1707765623.120:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.246150 env[1379]: time="2024-02-12T19:20:23.229514127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dhcgn,Uid:71d7a803-9799-4ac5-96cf-e4e27dc91f1d,Namespace:kube-system,Attempt:0,} returns sandbox id \"db6947cc64ab9740336ca952e184e2ad93aed1fc6c1bee58a0f99dda9aa2f755\"" Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.254778 kubelet[1953]: E0212 19:20:23.254363 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:23.266045 kernel: audit: type=1400 audit(1707765623.120:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.266140 kernel: audit: type=1400 audit(1707765623.120:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.300865 kernel: audit: type=1400 audit(1707765623.120:583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.317946 kernel: audit: type=1400 audit(1707765623.120:584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.120000 audit: BPF prog-id=72 op=LOAD Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363934376363363461623937343033333663613935326531383465 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363934376363363461623937343033333663613935326531383465 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.125000 audit: BPF prog-id=73 op=LOAD Feb 12 19:20:23.125000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363934376363363461623937343033333663613935326531383465 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.143000 audit: BPF prog-id=74 op=LOAD Feb 12 19:20:23.143000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363934376363363461623937343033333663613935326531383465 Feb 12 19:20:23.144000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:20:23.144000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:23.144000 audit: BPF prog-id=75 op=LOAD Feb 12 19:20:23.144000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2023 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363934376363363461623937343033333663613935326531383465 Feb 12 19:20:24.165744 kubelet[1953]: E0212 19:20:24.165693 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:24.512791 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2475980056.mount: Deactivated successfully. Feb 12 19:20:24.660206 env[1379]: time="2024-02-12T19:20:24.660162488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:24.665630 env[1379]: time="2024-02-12T19:20:24.665592209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:24.670142 env[1379]: time="2024-02-12T19:20:24.670110778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:24.673949 env[1379]: time="2024-02-12T19:20:24.673918222Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:24.674542 env[1379]: time="2024-02-12T19:20:24.674518471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:20:24.676105 env[1379]: time="2024-02-12T19:20:24.676082951Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:20:24.676920 env[1379]: time="2024-02-12T19:20:24.676892669Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:20:24.707458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount685389551.mount: Deactivated successfully. Feb 12 19:20:24.721382 env[1379]: time="2024-02-12T19:20:24.721333148Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4\"" Feb 12 19:20:24.722188 env[1379]: time="2024-02-12T19:20:24.722158826Z" level=info msg="StartContainer for \"5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4\"" Feb 12 19:20:24.737437 systemd[1]: Started cri-containerd-5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4.scope. Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2037 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:24.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313161303032393734376531656337336465343830376431656239 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit: BPF prog-id=76 op=LOAD Feb 12 19:20:24.751000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2037 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:24.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313161303032393734376531656337336465343830376431656239 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.751000 audit: BPF prog-id=77 op=LOAD Feb 12 19:20:24.751000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2037 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:24.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313161303032393734376531656337336465343830376431656239 Feb 12 19:20:24.752000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:20:24.752000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:24.752000 audit: BPF prog-id=78 op=LOAD Feb 12 19:20:24.752000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2037 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:24.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313161303032393734376531656337336465343830376431656239 Feb 12 19:20:24.773000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:20:24.772412 systemd[1]: cri-containerd-5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4.scope: Deactivated successfully. Feb 12 19:20:24.776206 env[1379]: time="2024-02-12T19:20:24.776027541Z" level=info msg="StartContainer for \"5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4\" returns successfully" Feb 12 19:20:24.923947 env[1379]: time="2024-02-12T19:20:24.923903790Z" level=info msg="shim disconnected" id=5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4 Feb 12 19:20:24.924161 env[1379]: time="2024-02-12T19:20:24.924141498Z" level=warning msg="cleaning up after shim disconnected" id=5b11a0029747e1ec73de4807d1eb93f6f8a6f0964be6de0d7c64fc8aff41f9e4 namespace=k8s.io Feb 12 19:20:24.924223 env[1379]: time="2024-02-12T19:20:24.924210655Z" level=info msg="cleaning up dead shim" Feb 12 19:20:24.931121 env[1379]: time="2024-02-12T19:20:24.931080902Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:20:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2145 runtime=io.containerd.runc.v2\n" Feb 12 19:20:25.166693 kubelet[1953]: E0212 19:20:25.166655 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:25.251926 kubelet[1953]: E0212 19:20:25.251562 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:25.977781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3913859302.mount: Deactivated successfully. Feb 12 19:20:26.167774 kubelet[1953]: E0212 19:20:26.167740 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:26.418218 env[1379]: time="2024-02-12T19:20:26.418172036Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:26.427568 env[1379]: time="2024-02-12T19:20:26.427520941Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:26.431806 env[1379]: time="2024-02-12T19:20:26.431773014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:26.437926 env[1379]: time="2024-02-12T19:20:26.437894597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:26.438253 env[1379]: time="2024-02-12T19:20:26.438222301Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 12 19:20:26.439137 env[1379]: time="2024-02-12T19:20:26.438888188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:20:26.440195 env[1379]: time="2024-02-12T19:20:26.440155287Z" level=info msg="CreateContainer within sandbox \"db6947cc64ab9740336ca952e184e2ad93aed1fc6c1bee58a0f99dda9aa2f755\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:20:26.464884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount194115880.mount: Deactivated successfully. Feb 12 19:20:26.468921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount840321705.mount: Deactivated successfully. Feb 12 19:20:26.486375 env[1379]: time="2024-02-12T19:20:26.486326600Z" level=info msg="CreateContainer within sandbox \"db6947cc64ab9740336ca952e184e2ad93aed1fc6c1bee58a0f99dda9aa2f755\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1caab2438036a9f2872fcb2c322c339253b2ffd12e71e2424de7298876f48f20\"" Feb 12 19:20:26.487331 env[1379]: time="2024-02-12T19:20:26.487293113Z" level=info msg="StartContainer for \"1caab2438036a9f2872fcb2c322c339253b2ffd12e71e2424de7298876f48f20\"" Feb 12 19:20:26.503007 systemd[1]: Started cri-containerd-1caab2438036a9f2872fcb2c322c339253b2ffd12e71e2424de7298876f48f20.scope. Feb 12 19:20:26.517000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.517000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2023 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616162323433383033366139663238373266636232633332326333 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit: BPF prog-id=79 op=LOAD Feb 12 19:20:26.518000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2023 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616162323433383033366139663238373266636232633332326333 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.518000 audit: BPF prog-id=80 op=LOAD Feb 12 19:20:26.518000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2023 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616162323433383033366139663238373266636232633332326333 Feb 12 19:20:26.519000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:20:26.519000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:26.519000 audit: BPF prog-id=81 op=LOAD Feb 12 19:20:26.519000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2023 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616162323433383033366139663238373266636232633332326333 Feb 12 19:20:26.536977 env[1379]: time="2024-02-12T19:20:26.536921258Z" level=info msg="StartContainer for \"1caab2438036a9f2872fcb2c322c339253b2ffd12e71e2424de7298876f48f20\" returns successfully" Feb 12 19:20:26.583000 audit[2219]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.583000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc154d410 a2=0 a3=ffff9be4a6c0 items=0 ppid=2181 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:20:26.585000 audit[2220]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.585000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce33f860 a2=0 a3=ffff8fa9a6c0 items=0 ppid=2181 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:20:26.586000 audit[2222]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.586000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5103480 a2=0 a3=ffff930de6c0 items=0 ppid=2181 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:20:26.587000 audit[2221]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.587000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9dfad40 a2=0 a3=ffffb724b6c0 items=0 ppid=2181 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:20:26.588000 audit[2223]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.588000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5b1c920 a2=0 a3=ffffa459b6c0 items=0 ppid=2181 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:20:26.589000 audit[2224]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.589000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda790710 a2=0 a3=ffffae33a6c0 items=0 ppid=2181 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:20:26.686000 audit[2225]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.686000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc3cf19b0 a2=0 a3=ffffb3fc56c0 items=0 ppid=2181 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:20:26.689000 audit[2227]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.689000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe143bf30 a2=0 a3=ffff9ae166c0 items=0 ppid=2181 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:20:26.692000 audit[2230]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.692000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffd7df860 a2=0 a3=ffff854416c0 items=0 ppid=2181 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:20:26.693000 audit[2231]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.693000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8e4c650 a2=0 a3=ffffaac1d6c0 items=0 ppid=2181 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:20:26.695000 audit[2233]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.695000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe75b4dc0 a2=0 a3=ffff9dfe36c0 items=0 ppid=2181 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:20:26.696000 audit[2234]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.696000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1ce2e20 a2=0 a3=ffffaf2ea6c0 items=0 ppid=2181 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:20:26.698000 audit[2236]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.698000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe2973740 a2=0 a3=ffff837c26c0 items=0 ppid=2181 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:20:26.701000 audit[2239]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.701000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffecd76ac0 a2=0 a3=ffffa39126c0 items=0 ppid=2181 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:20:26.702000 audit[2240]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.702000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd87b6c0 a2=0 a3=ffff97cde6c0 items=0 ppid=2181 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:20:26.705000 audit[2242]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.705000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc64b2d70 a2=0 a3=ffffbf62e6c0 items=0 ppid=2181 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:20:26.706000 audit[2243]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.706000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea8692c0 a2=0 a3=ffff9d4ab6c0 items=0 ppid=2181 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:20:26.709000 audit[2245]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.709000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd308d5b0 a2=0 a3=ffff849ee6c0 items=0 ppid=2181 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:26.713000 audit[2248]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc19d9ed0 a2=0 a3=ffffb50436c0 items=0 ppid=2181 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:26.716000 audit[2251]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.716000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffddc6b7d0 a2=0 a3=ffff91a846c0 items=0 ppid=2181 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:20:26.718000 audit[2252]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.718000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc0554750 a2=0 a3=ffffbbd996c0 items=0 ppid=2181 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:20:26.720000 audit[2254]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.720000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffde914f60 a2=0 a3=ffff8fe116c0 items=0 ppid=2181 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:26.762000 audit[2259]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.762000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffec98f8e0 a2=0 a3=ffff831596c0 items=0 ppid=2181 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:26.767000 audit[2264]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.767000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd955eb0 a2=0 a3=ffff9ad376c0 items=0 ppid=2181 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:20:26.769000 audit[2266]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:26.769000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcd3a1660 a2=0 a3=ffffa80156c0 items=0 ppid=2181 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:20:26.791000 audit[2268]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:26.791000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe82eb5e0 a2=0 a3=ffffb4f516c0 items=0 ppid=2181 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:26.870000 audit[2268]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:26.870000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffe82eb5e0 a2=0 a3=ffffb4f516c0 items=0 ppid=2181 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:26.927000 audit[2276]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.927000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc37acec0 a2=0 a3=ffffb99a16c0 items=0 ppid=2181 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:20:26.930000 audit[2278]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.930000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcf669d80 a2=0 a3=ffffad7cf6c0 items=0 ppid=2181 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:20:26.933000 audit[2281]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.933000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe724e8e0 a2=0 a3=ffffbbe5b6c0 items=0 ppid=2181 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:20:26.934000 audit[2282]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.934000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9d88370 a2=0 a3=ffffb63ff6c0 items=0 ppid=2181 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:20:26.937000 audit[2284]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.937000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd51892c0 a2=0 a3=ffff898bd6c0 items=0 ppid=2181 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:20:26.939000 audit[2285]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.939000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3d17780 a2=0 a3=ffffbc79c6c0 items=0 ppid=2181 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:20:26.941000 audit[2287]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.941000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd8475e60 a2=0 a3=ffffab9746c0 items=0 ppid=2181 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:20:26.944000 audit[2290]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.944000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8b40a00 a2=0 a3=ffffb210b6c0 items=0 ppid=2181 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:20:26.945000 audit[2291]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.945000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeedf03c0 a2=0 a3=ffff8aa626c0 items=0 ppid=2181 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:20:26.947000 audit[2293]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.947000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd9d77d70 a2=0 a3=ffffa00d06c0 items=0 ppid=2181 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:20:26.948000 audit[2294]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.948000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce4c6840 a2=0 a3=ffffaaffe6c0 items=0 ppid=2181 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:20:26.950000 audit[2296]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.950000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc1b10180 a2=0 a3=ffff9f2846c0 items=0 ppid=2181 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:26.953000 audit[2299]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.953000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff69dd7c0 a2=0 a3=ffff9ac346c0 items=0 ppid=2181 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:20:26.956000 audit[2302]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.956000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe1b0f4d0 a2=0 a3=ffff8a70f6c0 items=0 ppid=2181 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:20:26.957000 audit[2303]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.957000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd9d8e830 a2=0 a3=ffffa1e2e6c0 items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:20:26.959000 audit[2305]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.959000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc9e692d0 a2=0 a3=ffffae6026c0 items=0 ppid=2181 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:26.962000 audit[2308]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.962000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe72159a0 a2=0 a3=ffffa026d6c0 items=0 ppid=2181 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:26.963000 audit[2309]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.963000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde40b910 a2=0 a3=ffffb01aa6c0 items=0 ppid=2181 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:20:26.965000 audit[2311]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.965000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc6382440 a2=0 a3=ffffacdc96c0 items=0 ppid=2181 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:20:26.968000 audit[2314]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.968000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd7874710 a2=0 a3=ffffb06ec6c0 items=0 ppid=2181 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:20:26.969000 audit[2315]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.969000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff87c1a0 a2=0 a3=ffffb645c6c0 items=0 ppid=2181 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:20:26.971000 audit[2317]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:26.971000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcebf0b80 a2=0 a3=ffff9ead96c0 items=0 ppid=2181 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:20:26.973000 audit[2319]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:20:26.973000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd7393380 a2=0 a3=ffff80dd06c0 items=0 ppid=2181 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.973000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:26.974000 audit[2319]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:20:26.974000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffd7393380 a2=0 a3=ffff80dd06c0 items=0 ppid=2181 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:26.974000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:27.168802 kubelet[1953]: E0212 19:20:27.168756 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:27.253935 kubelet[1953]: E0212 19:20:27.251857 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:27.285103 kubelet[1953]: I0212 19:20:27.285057 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dhcgn" podStartSLOduration=4.094631947 podCreationTimestamp="2024-02-12 19:20:20 +0000 UTC" firstStartedPulling="2024-02-12 19:20:23.248211181 +0000 UTC m=+4.700913295" lastFinishedPulling="2024-02-12 19:20:26.438596242 +0000 UTC m=+7.891298316" observedRunningTime="2024-02-12 19:20:27.283852063 +0000 UTC m=+8.736554217" watchObservedRunningTime="2024-02-12 19:20:27.285016968 +0000 UTC m=+8.737719082" Feb 12 19:20:27.528937 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3741093742.mount: Deactivated successfully. Feb 12 19:20:28.169412 kubelet[1953]: E0212 19:20:28.169380 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:29.169915 kubelet[1953]: E0212 19:20:29.169879 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:29.252719 kubelet[1953]: E0212 19:20:29.252669 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:29.716495 env[1379]: time="2024-02-12T19:20:29.716448629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:29.724075 env[1379]: time="2024-02-12T19:20:29.724035528Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:29.728547 env[1379]: time="2024-02-12T19:20:29.728513406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:29.734924 env[1379]: time="2024-02-12T19:20:29.734890640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:29.735263 env[1379]: time="2024-02-12T19:20:29.735231384Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:20:29.737270 env[1379]: time="2024-02-12T19:20:29.737229895Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:20:29.761412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3309060398.mount: Deactivated successfully. Feb 12 19:20:29.778101 env[1379]: time="2024-02-12T19:20:29.778050139Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138\"" Feb 12 19:20:29.778962 env[1379]: time="2024-02-12T19:20:29.778936659Z" level=info msg="StartContainer for \"471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138\"" Feb 12 19:20:29.796259 systemd[1]: Started cri-containerd-471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138.scope. Feb 12 19:20:29.836233 kernel: kauditd_printk_skb: 287 callbacks suppressed Feb 12 19:20:29.836447 kernel: audit: type=1400 audit(1707765629.812:657): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2037 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437313033346334373131336464323463393566336336393432636265 Feb 12 19:20:29.890152 kernel: audit: type=1300 audit(1707765629.812:657): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2037 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.890271 kernel: audit: type=1327 audit(1707765629.812:657): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437313033346334373131336464323463393566336336393432636265 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.908772 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.935552 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.953946 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.957908 env[1379]: time="2024-02-12T19:20:29.957863815Z" level=info msg="StartContainer for \"471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138\" returns successfully" Feb 12 19:20:29.972377 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.991801 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.010267 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.028456 kernel: audit: type=1400 audit(1707765629.812:658): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.812000 audit: BPF prog-id=82 op=LOAD Feb 12 19:20:29.812000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2037 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437313033346334373131336464323463393566336336393432636265 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.817000 audit: BPF prog-id=83 op=LOAD Feb 12 19:20:29.817000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2037 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437313033346334373131336464323463393566336336393432636265 Feb 12 19:20:29.835000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:20:29.835000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:29.835000 audit: BPF prog-id=84 op=LOAD Feb 12 19:20:29.835000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2037 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437313033346334373131336464323463393566336336393432636265 Feb 12 19:20:30.170429 kubelet[1953]: E0212 19:20:30.170392 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:31.170778 kubelet[1953]: E0212 19:20:31.170749 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:31.250762 kubelet[1953]: E0212 19:20:31.250650 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:31.996563 systemd[1]: cri-containerd-471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138.scope: Deactivated successfully. Feb 12 19:20:31.999000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:20:32.016364 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138-rootfs.mount: Deactivated successfully. Feb 12 19:20:32.029401 kubelet[1953]: I0212 19:20:32.029024 1953 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:20:32.171660 kubelet[1953]: E0212 19:20:32.171623 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:32.869926 env[1379]: time="2024-02-12T19:20:32.869875967Z" level=info msg="shim disconnected" id=471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138 Feb 12 19:20:32.869926 env[1379]: time="2024-02-12T19:20:32.869920966Z" level=warning msg="cleaning up after shim disconnected" id=471034c47113dd24c95f3c6942cbe286d4c3e4bf200eff6774a095b8e297a138 namespace=k8s.io Feb 12 19:20:32.869926 env[1379]: time="2024-02-12T19:20:32.869929845Z" level=info msg="cleaning up dead shim" Feb 12 19:20:32.877089 env[1379]: time="2024-02-12T19:20:32.877044629Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:20:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2374 runtime=io.containerd.runc.v2\n" Feb 12 19:20:33.172739 kubelet[1953]: E0212 19:20:33.172627 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:33.256026 systemd[1]: Created slice kubepods-besteffort-poda3821f86_0264_4168_9734_5e7323fa14b3.slice. Feb 12 19:20:33.258216 env[1379]: time="2024-02-12T19:20:33.258171600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-59xtq,Uid:a3821f86-0264-4168-9734-5e7323fa14b3,Namespace:calico-system,Attempt:0,}" Feb 12 19:20:33.283143 env[1379]: time="2024-02-12T19:20:33.283105109Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:20:33.358896 env[1379]: time="2024-02-12T19:20:33.358831959Z" level=error msg="Failed to destroy network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:33.360262 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b-shm.mount: Deactivated successfully. Feb 12 19:20:33.361386 env[1379]: time="2024-02-12T19:20:33.361347097Z" level=error msg="encountered an error cleaning up failed sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:33.361509 env[1379]: time="2024-02-12T19:20:33.361484131Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-59xtq,Uid:a3821f86-0264-4168-9734-5e7323fa14b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:33.362212 kubelet[1953]: E0212 19:20:33.361818 1953 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:33.362212 kubelet[1953]: E0212 19:20:33.361887 1953 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:33.362212 kubelet[1953]: E0212 19:20:33.361907 1953 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-59xtq" Feb 12 19:20:33.362367 kubelet[1953]: E0212 19:20:33.361963 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-59xtq_calico-system(a3821f86-0264-4168-9734-5e7323fa14b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-59xtq_calico-system(a3821f86-0264-4168-9734-5e7323fa14b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:34.173346 kubelet[1953]: E0212 19:20:34.173299 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:34.284273 kubelet[1953]: I0212 19:20:34.284231 1953 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:34.285078 env[1379]: time="2024-02-12T19:20:34.285038772Z" level=info msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" Feb 12 19:20:34.309230 env[1379]: time="2024-02-12T19:20:34.309169819Z" level=error msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" failed" error="failed to destroy network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:34.309467 kubelet[1953]: E0212 19:20:34.309439 1953 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:34.309530 kubelet[1953]: E0212 19:20:34.309496 1953 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b} Feb 12 19:20:34.309559 kubelet[1953]: E0212 19:20:34.309532 1953 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3821f86-0264-4168-9734-5e7323fa14b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:20:34.309622 kubelet[1953]: E0212 19:20:34.309560 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3821f86-0264-4168-9734-5e7323fa14b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-59xtq" podUID=a3821f86-0264-4168-9734-5e7323fa14b3 Feb 12 19:20:35.173886 kubelet[1953]: E0212 19:20:35.173830 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:35.750734 kubelet[1953]: I0212 19:20:35.750690 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:20:35.755485 systemd[1]: Created slice kubepods-besteffort-poda2654ac7_efc3_4361_abb7_61568780f7cd.slice. Feb 12 19:20:35.898943 kubelet[1953]: I0212 19:20:35.898898 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwzfx\" (UniqueName: \"kubernetes.io/projected/a2654ac7-efc3-4361-abb7-61568780f7cd-kube-api-access-pwzfx\") pod \"nginx-deployment-845c78c8b9-hkjf6\" (UID: \"a2654ac7-efc3-4361-abb7-61568780f7cd\") " pod="default/nginx-deployment-845c78c8b9-hkjf6" Feb 12 19:20:36.058743 env[1379]: time="2024-02-12T19:20:36.058634929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hkjf6,Uid:a2654ac7-efc3-4361-abb7-61568780f7cd,Namespace:default,Attempt:0,}" Feb 12 19:20:36.174352 kubelet[1953]: E0212 19:20:36.174307 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:36.184531 env[1379]: time="2024-02-12T19:20:36.184463480Z" level=error msg="Failed to destroy network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:36.186787 env[1379]: time="2024-02-12T19:20:36.186374168Z" level=error msg="encountered an error cleaning up failed sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:36.186787 env[1379]: time="2024-02-12T19:20:36.186428926Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hkjf6,Uid:a2654ac7-efc3-4361-abb7-61568780f7cd,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:36.186899 kubelet[1953]: E0212 19:20:36.186647 1953 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:36.186899 kubelet[1953]: E0212 19:20:36.186691 1953 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-hkjf6" Feb 12 19:20:36.186899 kubelet[1953]: E0212 19:20:36.186731 1953 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-hkjf6" Feb 12 19:20:36.185973 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4-shm.mount: Deactivated successfully. Feb 12 19:20:36.187046 kubelet[1953]: E0212 19:20:36.186805 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-hkjf6_default(a2654ac7-efc3-4361-abb7-61568780f7cd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-hkjf6_default(a2654ac7-efc3-4361-abb7-61568780f7cd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-hkjf6" podUID=a2654ac7-efc3-4361-abb7-61568780f7cd Feb 12 19:20:36.288051 kubelet[1953]: I0212 19:20:36.288018 1953 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:36.288692 env[1379]: time="2024-02-12T19:20:36.288654804Z" level=info msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" Feb 12 19:20:36.333781 env[1379]: time="2024-02-12T19:20:36.333652673Z" level=error msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" failed" error="failed to destroy network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:36.334286 kubelet[1953]: E0212 19:20:36.334257 1953 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:36.334375 kubelet[1953]: E0212 19:20:36.334301 1953 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4} Feb 12 19:20:36.334375 kubelet[1953]: E0212 19:20:36.334336 1953 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2654ac7-efc3-4361-abb7-61568780f7cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:20:36.334375 kubelet[1953]: E0212 19:20:36.334363 1953 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2654ac7-efc3-4361-abb7-61568780f7cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-hkjf6" podUID=a2654ac7-efc3-4361-abb7-61568780f7cd Feb 12 19:20:37.174725 kubelet[1953]: E0212 19:20:37.174669 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:38.175805 kubelet[1953]: E0212 19:20:38.175762 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:38.396577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2855988623.mount: Deactivated successfully. Feb 12 19:20:38.824869 env[1379]: time="2024-02-12T19:20:38.824817277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:38.833171 env[1379]: time="2024-02-12T19:20:38.833127500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:38.836959 env[1379]: time="2024-02-12T19:20:38.836923725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:38.840377 env[1379]: time="2024-02-12T19:20:38.840333443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:38.840997 env[1379]: time="2024-02-12T19:20:38.840963940Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:20:38.853140 env[1379]: time="2024-02-12T19:20:38.853100346Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:20:38.881264 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435974065.mount: Deactivated successfully. Feb 12 19:20:38.895349 env[1379]: time="2024-02-12T19:20:38.895301557Z" level=info msg="CreateContainer within sandbox \"621817865b7f1f0f7f8f1ce4067fbb7f6248af9b1c6335da3c7e147aeec19f63\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7\"" Feb 12 19:20:38.895870 env[1379]: time="2024-02-12T19:20:38.895842378Z" level=info msg="StartContainer for \"0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7\"" Feb 12 19:20:38.910839 systemd[1]: Started cri-containerd-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7.scope. Feb 12 19:20:38.951255 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:20:38.951382 kernel: audit: type=1400 audit(1707765638.926:664): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2037 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:38.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031313465363832363631386334643931643832353631636438613433 Feb 12 19:20:38.981775 kernel: audit: type=1300 audit(1707765638.926:664): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2037 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:39.007604 env[1379]: time="2024-02-12T19:20:38.995729766Z" level=info msg="StartContainer for \"0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7\" returns successfully" Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.025479 kernel: audit: type=1327 audit(1707765638.926:664): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031313465363832363631386334643931643832353631636438613433 Feb 12 19:20:39.025569 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.042619 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.059739 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.079080 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.097432 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.114924 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:39.132419 kernel: audit: type=1400 audit(1707765638.926:665): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.926000 audit: BPF prog-id=85 op=LOAD Feb 12 19:20:38.926000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2037 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:38.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031313465363832363631386334643931643832353631636438613433 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.931000 audit: BPF prog-id=86 op=LOAD Feb 12 19:20:38.931000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2037 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:38.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031313465363832363631386334643931643832353631636438613433 Feb 12 19:20:38.949000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:20:38.949000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:38.949000 audit: BPF prog-id=87 op=LOAD Feb 12 19:20:38.949000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2037 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:38.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031313465363832363631386334643931643832353631636438613433 Feb 12 19:20:39.156885 kubelet[1953]: E0212 19:20:39.156848 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:39.176096 kubelet[1953]: E0212 19:20:39.176063 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:39.264526 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:20:39.264661 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:20:39.315950 kubelet[1953]: I0212 19:20:39.315909 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-n5dqh" podStartSLOduration=3.701252571 podCreationTimestamp="2024-02-12 19:20:20 +0000 UTC" firstStartedPulling="2024-02-12 19:20:23.227134172 +0000 UTC m=+4.679836286" lastFinishedPulling="2024-02-12 19:20:38.841637436 +0000 UTC m=+20.294339550" observedRunningTime="2024-02-12 19:20:39.313971297 +0000 UTC m=+20.766673411" watchObservedRunningTime="2024-02-12 19:20:39.315755835 +0000 UTC m=+20.768457909" Feb 12 19:20:40.176924 kubelet[1953]: E0212 19:20:40.176887 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:40.314467 systemd[1]: run-containerd-runc-k8s.io-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7-runc.uUbb06.mount: Deactivated successfully. Feb 12 19:20:40.550000 audit[2644]: AVC avc: denied { write } for pid=2644 comm="tee" name="fd" dev="proc" ino=18617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.550000 audit[2644]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe94a9982 a2=241 a3=1b6 items=1 ppid=2611 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.550000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:20:40.550000 audit: PATH item=0 name="/dev/fd/63" inode=18607 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.550000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.564000 audit[2665]: AVC avc: denied { write } for pid=2665 comm="tee" name="fd" dev="proc" ino=17884 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.570000 audit[2667]: AVC avc: denied { write } for pid=2667 comm="tee" name="fd" dev="proc" ino=18634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.570000 audit[2667]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe44fd981 a2=241 a3=1b6 items=1 ppid=2625 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.570000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:20:40.570000 audit: PATH item=0 name="/dev/fd/63" inode=17881 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.564000 audit[2665]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde4f2981 a2=241 a3=1b6 items=1 ppid=2620 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.575000 audit[2670]: AVC avc: denied { write } for pid=2670 comm="tee" name="fd" dev="proc" ino=18639 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.575000 audit[2670]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5101971 a2=241 a3=1b6 items=1 ppid=2623 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.575000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:20:40.575000 audit: PATH item=0 name="/dev/fd/63" inode=17887 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.575000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.564000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:20:40.564000 audit: PATH item=0 name="/dev/fd/63" inode=17880 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.564000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.580000 audit[2672]: AVC avc: denied { write } for pid=2672 comm="tee" name="fd" dev="proc" ino=18644 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.580000 audit[2672]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7b8d972 a2=241 a3=1b6 items=1 ppid=2628 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.580000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:20:40.580000 audit: PATH item=0 name="/dev/fd/63" inode=18631 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.585000 audit[2675]: AVC avc: denied { write } for pid=2675 comm="tee" name="fd" dev="proc" ino=17893 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.585000 audit[2675]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe641c981 a2=241 a3=1b6 items=1 ppid=2619 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.585000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:20:40.585000 audit: PATH item=0 name="/dev/fd/63" inode=18636 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.585000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.587000 audit[2678]: AVC avc: denied { write } for pid=2678 comm="tee" name="fd" dev="proc" ino=18648 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:40.587000 audit[2678]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd46c983 a2=241 a3=1b6 items=1 ppid=2627 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.587000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:20:40.587000 audit: PATH item=0 name="/dev/fd/63" inode=18641 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:40.587000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:40.795801 kernel: Initializing XFRM netlink socket Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit: BPF prog-id=88 op=LOAD Feb 12 19:20:40.912000 audit[2752]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff55ab858 a2=70 a3=0 items=0 ppid=2622 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.912000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:40.912000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.912000 audit: BPF prog-id=89 op=LOAD Feb 12 19:20:40.912000 audit[2752]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff55ab858 a2=70 a3=4a174c items=0 ppid=2622 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.912000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:40.913000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff55ab888 a2=70 a3=304e079f items=0 ppid=2622 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.913000 audit: BPF prog-id=90 op=LOAD Feb 12 19:20:40.913000 audit[2752]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff55ab7d8 a2=70 a3=304e07b9 items=0 ppid=2622 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:40.918000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.918000 audit[2755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc62bef88 a2=70 a3=0 items=0 ppid=2622 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:20:40.919000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.919000 audit[2755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc62bee68 a2=70 a3=2 items=0 ppid=2622 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.919000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:20:40.928000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:20:41.070000 audit[2779]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:41.070000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd44d03f0 a2=0 a3=ffff8cedbfa8 items=0 ppid=2622 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:41.070000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:41.090000 audit[2777]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:41.090000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffd39f4cb0 a2=0 a3=ffffb4c27fa8 items=0 ppid=2622 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:41.090000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:41.091000 audit[2778]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:41.091000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffe4d6c990 a2=0 a3=ffff94005fa8 items=0 ppid=2622 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:41.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:41.093000 audit[2780]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:41.093000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd25881f0 a2=0 a3=ffff9eb41fa8 items=0 ppid=2622 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:41.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:41.177735 kubelet[1953]: E0212 19:20:41.177615 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:41.908528 systemd-networkd[1523]: vxlan.calico: Link UP Feb 12 19:20:41.908536 systemd-networkd[1523]: vxlan.calico: Gained carrier Feb 12 19:20:42.178391 kubelet[1953]: E0212 19:20:42.178286 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:43.178774 kubelet[1953]: E0212 19:20:43.178730 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:43.406859 systemd-networkd[1523]: vxlan.calico: Gained IPv6LL Feb 12 19:20:44.179865 kubelet[1953]: E0212 19:20:44.179832 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:45.181208 kubelet[1953]: E0212 19:20:45.181167 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:46.181685 kubelet[1953]: E0212 19:20:46.181643 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:47.182133 kubelet[1953]: E0212 19:20:47.182094 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:48.183113 kubelet[1953]: E0212 19:20:48.183050 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:48.252026 env[1379]: time="2024-02-12T19:20:48.251969515Z" level=info msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] k8s.go 578: Cleaning up netns ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" iface="eth0" netns="/var/run/netns/cni-3d5b64f4-14cf-2966-698d-ef463178bbd5" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" iface="eth0" netns="/var/run/netns/cni-3d5b64f4-14cf-2966-698d-ef463178bbd5" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" iface="eth0" netns="/var/run/netns/cni-3d5b64f4-14cf-2966-698d-ef463178bbd5" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] k8s.go 585: Releasing IP address(es) ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.298 [INFO][2816] utils.go 188: Calico CNI releasing IP address ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.317 [INFO][2823] ipam_plugin.go 415: Releasing address using handleID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.317 [INFO][2823] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.317 [INFO][2823] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.329 [WARNING][2823] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.329 [INFO][2823] ipam_plugin.go 443: Releasing address using workloadID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.331 [INFO][2823] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:48.333272 env[1379]: 2024-02-12 19:20:48.332 [INFO][2816] k8s.go 591: Teardown processing complete. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:20:48.334846 env[1379]: time="2024-02-12T19:20:48.334808700Z" level=info msg="TearDown network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" successfully" Feb 12 19:20:48.334926 env[1379]: time="2024-02-12T19:20:48.334910697Z" level=info msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" returns successfully" Feb 12 19:20:48.336062 systemd[1]: run-netns-cni\x2d3d5b64f4\x2d14cf\x2d2966\x2d698d\x2def463178bbd5.mount: Deactivated successfully. Feb 12 19:20:48.337238 env[1379]: time="2024-02-12T19:20:48.337204592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-59xtq,Uid:a3821f86-0264-4168-9734-5e7323fa14b3,Namespace:calico-system,Attempt:1,}" Feb 12 19:20:48.501873 systemd-networkd[1523]: calia549e8dffcf: Link UP Feb 12 19:20:48.516831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:20:48.516927 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia549e8dffcf: link becomes ready Feb 12 19:20:48.518587 systemd-networkd[1523]: calia549e8dffcf: Gained carrier Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.408 [INFO][2829] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-csi--node--driver--59xtq-eth0 csi-node-driver- calico-system a3821f86-0264-4168-9734-5e7323fa14b3 1267 0 2024-02-12 19:20:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 csi-node-driver-59xtq eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia549e8dffcf [] []}} ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.408 [INFO][2829] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.433 [INFO][2841] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" HandleID="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.456 [INFO][2841] ipam_plugin.go 268: Auto assigning IP ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" HandleID="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b27c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.48", "pod":"csi-node-driver-59xtq", "timestamp":"2024-02-12 19:20:48.433511397 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.456 [INFO][2841] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.456 [INFO][2841] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.456 [INFO][2841] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.458 [INFO][2841] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.462 [INFO][2841] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.465 [INFO][2841] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.467 [INFO][2841] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.469 [INFO][2841] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.469 [INFO][2841] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.476 [INFO][2841] ipam.go 1682: Creating new handle: k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.481 [INFO][2841] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.492 [INFO][2841] ipam.go 1216: Successfully claimed IPs: [192.168.41.1/26] block=192.168.41.0/26 handle="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.494 [INFO][2841] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.1/26] handle="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" host="10.200.20.48" Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.495 [INFO][2841] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:48.529035 env[1379]: 2024-02-12 19:20:48.495 [INFO][2841] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.41.1/26] IPv6=[] ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" HandleID="k8s-pod-network.5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.497 [INFO][2829] k8s.go 385: Populated endpoint ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--59xtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3821f86-0264-4168-9734-5e7323fa14b3", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"csi-node-driver-59xtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia549e8dffcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.497 [INFO][2829] k8s.go 386: Calico CNI using IPs: [192.168.41.1/32] ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.497 [INFO][2829] dataplane_linux.go 68: Setting the host side veth name to calia549e8dffcf ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.517 [INFO][2829] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.518 [INFO][2829] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--59xtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3821f86-0264-4168-9734-5e7323fa14b3", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac", Pod:"csi-node-driver-59xtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia549e8dffcf", MAC:"66:7a:1b:95:c6:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:48.530700 env[1379]: 2024-02-12 19:20:48.527 [INFO][2829] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac" Namespace="calico-system" Pod="csi-node-driver-59xtq" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:20:48.562115 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 12 19:20:48.562224 kernel: audit: type=1325 audit(1707765648.542:690): table=filter:73 family=2 entries=36 op=nft_register_chain pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:48.542000 audit[2864]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:48.562393 env[1379]: time="2024-02-12T19:20:48.547801815Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:48.562393 env[1379]: time="2024-02-12T19:20:48.548048888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:48.562393 env[1379]: time="2024-02-12T19:20:48.548063528Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:48.562393 env[1379]: time="2024-02-12T19:20:48.548182245Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac pid=2871 runtime=io.containerd.runc.v2 Feb 12 19:20:48.563306 systemd[1]: Started cri-containerd-5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac.scope. Feb 12 19:20:48.542000 audit[2864]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff39d74f0 a2=0 a3=ffffaacd7fa8 items=0 ppid=2622 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.594588 kernel: audit: type=1300 audit(1707765648.542:690): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff39d74f0 a2=0 a3=ffffaacd7fa8 items=0 ppid=2622 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.611843 kernel: audit: type=1327 audit(1707765648.542:690): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:48.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.633063 kernel: audit: type=1400 audit(1707765648.581:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.650793 kernel: audit: type=1400 audit(1707765648.581:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.668446 kernel: audit: type=1400 audit(1707765648.581:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.686210 kernel: audit: type=1400 audit(1707765648.581:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.694345 env[1379]: time="2024-02-12T19:20:48.694299605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-59xtq,Uid:a3821f86-0264-4168-9734-5e7323fa14b3,Namespace:calico-system,Attempt:1,} returns sandbox id \"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac\"" Feb 12 19:20:48.705534 kernel: audit: type=1400 audit(1707765648.581:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.722992 kernel: audit: type=1400 audit(1707765648.581:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.741195 kernel: audit: type=1400 audit(1707765648.581:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.594000 audit: BPF prog-id=91 op=LOAD Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383934303937653330363766623436643965643530643834626230 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383934303937653330363766623436643965643530643834626230 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.595000 audit: BPF prog-id=92 op=LOAD Feb 12 19:20:48.595000 audit[2882]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383934303937653330363766623436643965643530643834626230 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.624000 audit: BPF prog-id=93 op=LOAD Feb 12 19:20:48.624000 audit[2882]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383934303937653330363766623436643965643530643834626230 Feb 12 19:20:48.632000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:20:48.632000 audit: BPF prog-id=92 op=UNLOAD Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:48.632000 audit: BPF prog-id=94 op=LOAD Feb 12 19:20:48.632000 audit[2882]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2871 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383934303937653330363766623436643965643530643834626230 Feb 12 19:20:48.743689 env[1379]: time="2024-02-12T19:20:48.743655854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:20:49.183622 kubelet[1953]: E0212 19:20:49.183589 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:50.030507 env[1379]: time="2024-02-12T19:20:50.030460162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:50.037976 env[1379]: time="2024-02-12T19:20:50.037927881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:50.045525 env[1379]: time="2024-02-12T19:20:50.045483998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:50.049533 env[1379]: time="2024-02-12T19:20:50.049500529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:50.049866 env[1379]: time="2024-02-12T19:20:50.049836960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:20:50.052424 env[1379]: time="2024-02-12T19:20:50.052392812Z" level=info msg="CreateContainer within sandbox \"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:20:50.096983 env[1379]: time="2024-02-12T19:20:50.096934491Z" level=info msg="CreateContainer within sandbox \"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"293a2272f2bf063437556bb5deb7a935b23c05059b49382994463f171f3c2785\"" Feb 12 19:20:50.097907 env[1379]: time="2024-02-12T19:20:50.097872866Z" level=info msg="StartContainer for \"293a2272f2bf063437556bb5deb7a935b23c05059b49382994463f171f3c2785\"" Feb 12 19:20:50.117814 systemd[1]: run-containerd-runc-k8s.io-293a2272f2bf063437556bb5deb7a935b23c05059b49382994463f171f3c2785-runc.NujXEp.mount: Deactivated successfully. Feb 12 19:20:50.121930 systemd[1]: Started cri-containerd-293a2272f2bf063437556bb5deb7a935b23c05059b49382994463f171f3c2785.scope. Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2871 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336132323732663262663036333433373535366262356465623761 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.134000 audit: BPF prog-id=95 op=LOAD Feb 12 19:20:50.134000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2871 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336132323732663262663036333433373535366262356465623761 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit: BPF prog-id=96 op=LOAD Feb 12 19:20:50.135000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2871 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336132323732663262663036333433373535366262356465623761 Feb 12 19:20:50.135000 audit: BPF prog-id=96 op=UNLOAD Feb 12 19:20:50.135000 audit: BPF prog-id=95 op=UNLOAD Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.135000 audit: BPF prog-id=97 op=LOAD Feb 12 19:20:50.135000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2871 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336132323732663262663036333433373535366262356465623761 Feb 12 19:20:50.156109 env[1379]: time="2024-02-12T19:20:50.156051898Z" level=info msg="StartContainer for \"293a2272f2bf063437556bb5deb7a935b23c05059b49382994463f171f3c2785\" returns successfully" Feb 12 19:20:50.157601 env[1379]: time="2024-02-12T19:20:50.157574497Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:20:50.184637 kubelet[1953]: E0212 19:20:50.184603 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:50.251463 env[1379]: time="2024-02-12T19:20:50.251428689Z" level=info msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" Feb 12 19:20:50.256514 systemd-networkd[1523]: calia549e8dffcf: Gained IPv6LL Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] k8s.go 578: Cleaning up netns ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" iface="eth0" netns="/var/run/netns/cni-758f65d4-8797-9ad4-c075-1691eb71d3b3" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" iface="eth0" netns="/var/run/netns/cni-758f65d4-8797-9ad4-c075-1691eb71d3b3" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" iface="eth0" netns="/var/run/netns/cni-758f65d4-8797-9ad4-c075-1691eb71d3b3" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] k8s.go 585: Releasing IP address(es) ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.291 [INFO][2954] utils.go 188: Calico CNI releasing IP address ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.309 [INFO][2961] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.310 [INFO][2961] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.310 [INFO][2961] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.319 [WARNING][2961] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.319 [INFO][2961] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.321 [INFO][2961] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:50.323384 env[1379]: 2024-02-12 19:20:50.322 [INFO][2954] k8s.go 591: Teardown processing complete. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:20:50.324679 env[1379]: time="2024-02-12T19:20:50.324640396Z" level=info msg="TearDown network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" successfully" Feb 12 19:20:50.324780 env[1379]: time="2024-02-12T19:20:50.324762473Z" level=info msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" returns successfully" Feb 12 19:20:50.325407 env[1379]: time="2024-02-12T19:20:50.325382456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hkjf6,Uid:a2654ac7-efc3-4361-abb7-61568780f7cd,Namespace:default,Attempt:1,}" Feb 12 19:20:50.467585 systemd-networkd[1523]: cali8d2e8d7f10a: Link UP Feb 12 19:20:50.481733 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:20:50.481836 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8d2e8d7f10a: link becomes ready Feb 12 19:20:50.483090 systemd-networkd[1523]: cali8d2e8d7f10a: Gained carrier Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.400 [INFO][2968] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0 nginx-deployment-845c78c8b9- default a2654ac7-efc3-4361-abb7-61568780f7cd 1280 0 2024-02-12 19:20:35 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 nginx-deployment-845c78c8b9-hkjf6 eth0 default [] [] [kns.default ksa.default.default] cali8d2e8d7f10a [] []}} ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.401 [INFO][2968] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.428 [INFO][2979] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" HandleID="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.440 [INFO][2979] ipam_plugin.go 268: Auto assigning IP ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" HandleID="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ba7c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"nginx-deployment-845c78c8b9-hkjf6", "timestamp":"2024-02-12 19:20:50.428056089 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.440 [INFO][2979] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.440 [INFO][2979] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.440 [INFO][2979] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.441 [INFO][2979] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.445 [INFO][2979] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.448 [INFO][2979] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.450 [INFO][2979] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.452 [INFO][2979] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.452 [INFO][2979] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.453 [INFO][2979] ipam.go 1682: Creating new handle: k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01 Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.456 [INFO][2979] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.462 [INFO][2979] ipam.go 1216: Successfully claimed IPs: [192.168.41.2/26] block=192.168.41.0/26 handle="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.462 [INFO][2979] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.2/26] handle="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" host="10.200.20.48" Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.463 [INFO][2979] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:50.494112 env[1379]: 2024-02-12 19:20:50.463 [INFO][2979] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.41.2/26] IPv6=[] ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" HandleID="k8s-pod-network.68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.464 [INFO][2968] k8s.go 385: Populated endpoint ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a2654ac7-efc3-4361-abb7-61568780f7cd", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-hkjf6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8d2e8d7f10a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.464 [INFO][2968] k8s.go 386: Calico CNI using IPs: [192.168.41.2/32] ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.464 [INFO][2968] dataplane_linux.go 68: Setting the host side veth name to cali8d2e8d7f10a ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.483 [INFO][2968] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.484 [INFO][2968] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a2654ac7-efc3-4361-abb7-61568780f7cd", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01", Pod:"nginx-deployment-845c78c8b9-hkjf6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8d2e8d7f10a", MAC:"f6:c0:6b:ae:f1:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:50.494681 env[1379]: 2024-02-12 19:20:50.490 [INFO][2968] k8s.go 491: Wrote updated endpoint to datastore ContainerID="68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01" Namespace="default" Pod="nginx-deployment-845c78c8b9-hkjf6" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:20:50.503000 audit[3000]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:50.503000 audit[3000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=ffffdc6e8e80 a2=0 a3=ffff9828dfa8 items=0 ppid=2622 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:50.514216 env[1379]: time="2024-02-12T19:20:50.514151050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:50.514460 env[1379]: time="2024-02-12T19:20:50.514192808Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:50.514460 env[1379]: time="2024-02-12T19:20:50.514203168Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:50.514460 env[1379]: time="2024-02-12T19:20:50.514348444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01 pid=3008 runtime=io.containerd.runc.v2 Feb 12 19:20:50.525564 systemd[1]: Started cri-containerd-68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01.scope. Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.542000 audit: BPF prog-id=98 op=LOAD Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638623331383366333833386233623432356433663739323064626332 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638623331383366333833386233623432356433663739323064626332 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit: BPF prog-id=99 op=LOAD Feb 12 19:20:50.543000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638623331383366333833386233623432356433663739323064626332 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit: BPF prog-id=100 op=LOAD Feb 12 19:20:50.543000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638623331383366333833386233623432356433663739323064626332 Feb 12 19:20:50.543000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:20:50.543000 audit: BPF prog-id=99 op=UNLOAD Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.543000 audit: BPF prog-id=101 op=LOAD Feb 12 19:20:50.543000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638623331383366333833386233623432356433663739323064626332 Feb 12 19:20:50.564623 env[1379]: time="2024-02-12T19:20:50.564580211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hkjf6,Uid:a2654ac7-efc3-4361-abb7-61568780f7cd,Namespace:default,Attempt:1,} returns sandbox id \"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01\"" Feb 12 19:20:51.081696 systemd[1]: run-netns-cni\x2d758f65d4\x2d8797\x2d9ad4\x2dc075\x2d1691eb71d3b3.mount: Deactivated successfully. Feb 12 19:20:51.185082 kubelet[1953]: E0212 19:20:51.185041 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:51.535652 env[1379]: time="2024-02-12T19:20:51.535601444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:51.546471 env[1379]: time="2024-02-12T19:20:51.546415879Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:51.549902 env[1379]: time="2024-02-12T19:20:51.549871708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:51.554646 env[1379]: time="2024-02-12T19:20:51.554614103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:51.555025 env[1379]: time="2024-02-12T19:20:51.554989613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:20:51.556314 env[1379]: time="2024-02-12T19:20:51.556285379Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:20:51.557283 env[1379]: time="2024-02-12T19:20:51.557240674Z" level=info msg="CreateContainer within sandbox \"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:20:51.589553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount141513464.mount: Deactivated successfully. Feb 12 19:20:51.598904 systemd-networkd[1523]: cali8d2e8d7f10a: Gained IPv6LL Feb 12 19:20:51.604597 env[1379]: time="2024-02-12T19:20:51.604549788Z" level=info msg="CreateContainer within sandbox \"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9681a4511aa780142edf70ea9a9ac40f6a340ded52fd7e06363dd9aac11bd23d\"" Feb 12 19:20:51.605341 env[1379]: time="2024-02-12T19:20:51.605314767Z" level=info msg="StartContainer for \"9681a4511aa780142edf70ea9a9ac40f6a340ded52fd7e06363dd9aac11bd23d\"" Feb 12 19:20:51.622576 systemd[1]: Started cri-containerd-9681a4511aa780142edf70ea9a9ac40f6a340ded52fd7e06363dd9aac11bd23d.scope. Feb 12 19:20:51.640000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.640000 audit[3060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2871 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:51.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383161343531316161373830313432656466373065613961396163 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit: BPF prog-id=102 op=LOAD Feb 12 19:20:51.641000 audit[3060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2871 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:51.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383161343531316161373830313432656466373065613961396163 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.641000 audit: BPF prog-id=103 op=LOAD Feb 12 19:20:51.641000 audit[3060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2871 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:51.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383161343531316161373830313432656466373065613961396163 Feb 12 19:20:51.642000 audit: BPF prog-id=103 op=UNLOAD Feb 12 19:20:51.642000 audit: BPF prog-id=102 op=UNLOAD Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:51.642000 audit: BPF prog-id=104 op=LOAD Feb 12 19:20:51.642000 audit[3060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2871 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:51.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383161343531316161373830313432656466373065613961396163 Feb 12 19:20:51.664970 env[1379]: time="2024-02-12T19:20:51.664927996Z" level=info msg="StartContainer for \"9681a4511aa780142edf70ea9a9ac40f6a340ded52fd7e06363dd9aac11bd23d\" returns successfully" Feb 12 19:20:52.080286 systemd[1]: run-containerd-runc-k8s.io-9681a4511aa780142edf70ea9a9ac40f6a340ded52fd7e06363dd9aac11bd23d-runc.6r8vZX.mount: Deactivated successfully. Feb 12 19:20:52.185755 kubelet[1953]: E0212 19:20:52.185683 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:52.264783 kubelet[1953]: I0212 19:20:52.264761 1953 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:20:52.264971 kubelet[1953]: I0212 19:20:52.264961 1953 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:20:52.340333 kubelet[1953]: I0212 19:20:52.340050 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-59xtq" podStartSLOduration=29.527823225 podCreationTimestamp="2024-02-12 19:20:20 +0000 UTC" firstStartedPulling="2024-02-12 19:20:48.743191387 +0000 UTC m=+30.195893501" lastFinishedPulling="2024-02-12 19:20:51.555368483 +0000 UTC m=+33.008070597" observedRunningTime="2024-02-12 19:20:52.339936922 +0000 UTC m=+33.792639076" watchObservedRunningTime="2024-02-12 19:20:52.340000321 +0000 UTC m=+33.792702435" Feb 12 19:20:53.186318 kubelet[1953]: E0212 19:20:53.186280 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:54.156462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908909949.mount: Deactivated successfully. Feb 12 19:20:54.187253 kubelet[1953]: E0212 19:20:54.187189 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:55.045451 env[1379]: time="2024-02-12T19:20:55.045403115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.055142 env[1379]: time="2024-02-12T19:20:55.055097560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.061835 env[1379]: time="2024-02-12T19:20:55.061784839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.068636 env[1379]: time="2024-02-12T19:20:55.068595714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.069351 env[1379]: time="2024-02-12T19:20:55.069315697Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:20:55.071371 env[1379]: time="2024-02-12T19:20:55.071322689Z" level=info msg="CreateContainer within sandbox \"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:20:55.116104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount424279847.mount: Deactivated successfully. Feb 12 19:20:55.121932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3290717211.mount: Deactivated successfully. Feb 12 19:20:55.135377 env[1379]: time="2024-02-12T19:20:55.135320263Z" level=info msg="CreateContainer within sandbox \"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c7ed937199cac2e558571a7a4a04ed88156bd1f89c77eabbf2bab433aa09a95f\"" Feb 12 19:20:55.136247 env[1379]: time="2024-02-12T19:20:55.136200601Z" level=info msg="StartContainer for \"c7ed937199cac2e558571a7a4a04ed88156bd1f89c77eabbf2bab433aa09a95f\"" Feb 12 19:20:55.160678 systemd[1]: Started cri-containerd-c7ed937199cac2e558571a7a4a04ed88156bd1f89c77eabbf2bab433aa09a95f.scope. Feb 12 19:20:55.196885 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 12 19:20:55.197030 kernel: audit: type=1400 audit(1707765655.173:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.197159 kubelet[1953]: E0212 19:20:55.196828 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.214989 kernel: audit: type=1400 audit(1707765655.173:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.232311 kernel: audit: type=1400 audit(1707765655.173:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.249739 kernel: audit: type=1400 audit(1707765655.173:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.267175 kernel: audit: type=1400 audit(1707765655.173:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.285965 kernel: audit: type=1400 audit(1707765655.173:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.304189 kernel: audit: type=1400 audit(1707765655.173:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.322616 kernel: audit: type=1400 audit(1707765655.174:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.322698 kernel: audit: type=1400 audit(1707765655.174:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.356520 kernel: audit: type=1400 audit(1707765655.179:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.179000 audit: BPF prog-id=105 op=LOAD Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3008 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656439333731393963616332653535383537316137613461303465 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3008 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656439333731393963616332653535383537316137613461303465 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.180000 audit: BPF prog-id=106 op=LOAD Feb 12 19:20:55.180000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3008 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656439333731393963616332653535383537316137613461303465 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit: BPF prog-id=107 op=LOAD Feb 12 19:20:55.196000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3008 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656439333731393963616332653535383537316137613461303465 Feb 12 19:20:55.196000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:20:55.196000 audit: BPF prog-id=106 op=UNLOAD Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.196000 audit: BPF prog-id=108 op=LOAD Feb 12 19:20:55.196000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3008 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656439333731393963616332653535383537316137613461303465 Feb 12 19:20:55.358452 env[1379]: time="2024-02-12T19:20:55.358415994Z" level=info msg="StartContainer for \"c7ed937199cac2e558571a7a4a04ed88156bd1f89c77eabbf2bab433aa09a95f\" returns successfully" Feb 12 19:20:55.368591 kubelet[1953]: I0212 19:20:55.368350 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-hkjf6" podStartSLOduration=15.864854073 podCreationTimestamp="2024-02-12 19:20:35 +0000 UTC" firstStartedPulling="2024-02-12 19:20:50.566157248 +0000 UTC m=+32.018859362" lastFinishedPulling="2024-02-12 19:20:55.06961445 +0000 UTC m=+36.522316564" observedRunningTime="2024-02-12 19:20:55.36808304 +0000 UTC m=+36.820785154" watchObservedRunningTime="2024-02-12 19:20:55.368311275 +0000 UTC m=+36.821013389" Feb 12 19:20:56.197673 kubelet[1953]: E0212 19:20:56.197624 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:57.197993 kubelet[1953]: E0212 19:20:57.197946 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:58.198408 kubelet[1953]: E0212 19:20:58.198363 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:59.157733 kubelet[1953]: E0212 19:20:59.157688 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:59.198899 kubelet[1953]: E0212 19:20:59.198883 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:00.199749 kubelet[1953]: E0212 19:21:00.199681 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:01.201115 kubelet[1953]: E0212 19:21:01.201080 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:02.201760 kubelet[1953]: E0212 19:21:02.201718 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:03.031363 kubelet[1953]: I0212 19:21:03.031328 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:21:03.035863 systemd[1]: Created slice kubepods-besteffort-podbeb802b4_3a57_47fd_8926_0a0a614291df.slice. Feb 12 19:21:03.059000 audit[3162]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.065149 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 19:21:03.065261 kernel: audit: type=1325 audit(1707765663.059:758): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.059000 audit[3162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffd5bde90 a2=0 a3=ffff86dd96c0 items=0 ppid=2181 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.105770 kernel: audit: type=1300 audit(1707765663.059:758): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffd5bde90 a2=0 a3=ffff86dd96c0 items=0 ppid=2181 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.118841 kernel: audit: type=1327 audit(1707765663.059:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.059000 audit[3162]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.059000 audit[3162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffffd5bde90 a2=0 a3=ffff86dd96c0 items=0 ppid=2181 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.161107 kernel: audit: type=1325 audit(1707765663.059:759): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.161209 kernel: audit: type=1300 audit(1707765663.059:759): arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffffd5bde90 a2=0 a3=ffff86dd96c0 items=0 ppid=2181 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.175143 kernel: audit: type=1327 audit(1707765663.059:759): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.160000 audit[3166]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.160000 audit[3166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffd6359960 a2=0 a3=ffffa91486c0 items=0 ppid=2181 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.216646 kernel: audit: type=1325 audit(1707765663.160:760): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.216752 kernel: audit: type=1300 audit(1707765663.160:760): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffd6359960 a2=0 a3=ffffa91486c0 items=0 ppid=2181 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.216886 kubelet[1953]: E0212 19:21:03.216863 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:03.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.230116 kernel: audit: type=1327 audit(1707765663.160:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.175000 audit[3166]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.243918 kernel: audit: type=1325 audit(1707765663.175:761): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.244005 kubelet[1953]: I0212 19:21:03.234445 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/beb802b4-3a57-47fd-8926-0a0a614291df-data\") pod \"nfs-server-provisioner-0\" (UID: \"beb802b4-3a57-47fd-8926-0a0a614291df\") " pod="default/nfs-server-provisioner-0" Feb 12 19:21:03.244005 kubelet[1953]: I0212 19:21:03.234572 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l5nhm\" (UniqueName: \"kubernetes.io/projected/beb802b4-3a57-47fd-8926-0a0a614291df-kube-api-access-l5nhm\") pod \"nfs-server-provisioner-0\" (UID: \"beb802b4-3a57-47fd-8926-0a0a614291df\") " pod="default/nfs-server-provisioner-0" Feb 12 19:21:03.175000 audit[3166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffd6359960 a2=0 a3=ffffa91486c0 items=0 ppid=2181 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.640397 env[1379]: time="2024-02-12T19:21:03.640051889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:beb802b4-3a57-47fd-8926-0a0a614291df,Namespace:default,Attempt:0,}" Feb 12 19:21:03.784771 systemd-networkd[1523]: cali60e51b789ff: Link UP Feb 12 19:21:03.800653 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:21:03.800781 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:21:03.801307 systemd-networkd[1523]: cali60e51b789ff: Gained carrier Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.708 [INFO][3168] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default beb802b4-3a57-47fd-8926-0a0a614291df 1344 0 2024-02-12 19:21:03 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.48 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.708 [INFO][3168] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.731 [INFO][3180] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" HandleID="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.746 [INFO][3180] ipam_plugin.go 268: Auto assigning IP ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" HandleID="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:21:03.73164785 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.746 [INFO][3180] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.746 [INFO][3180] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.746 [INFO][3180] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.748 [INFO][3180] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.750 [INFO][3180] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.754 [INFO][3180] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.755 [INFO][3180] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.757 [INFO][3180] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.757 [INFO][3180] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.759 [INFO][3180] ipam.go 1682: Creating new handle: k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24 Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.762 [INFO][3180] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.777 [INFO][3180] ipam.go 1216: Successfully claimed IPs: [192.168.41.3/26] block=192.168.41.0/26 handle="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.779 [INFO][3180] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.3/26] handle="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" host="10.200.20.48" Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.779 [INFO][3180] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:03.816287 env[1379]: 2024-02-12 19:21:03.779 [INFO][3180] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.41.3/26] IPv6=[] ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" HandleID="k8s-pod-network.2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.816924 env[1379]: 2024-02-12 19:21:03.781 [INFO][3168] k8s.go 385: Populated endpoint ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"beb802b4-3a57-47fd-8926-0a0a614291df", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:03.816924 env[1379]: 2024-02-12 19:21:03.781 [INFO][3168] k8s.go 386: Calico CNI using IPs: [192.168.41.3/32] ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.816924 env[1379]: 2024-02-12 19:21:03.781 [INFO][3168] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.816924 env[1379]: 2024-02-12 19:21:03.801 [INFO][3168] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.817098 env[1379]: 2024-02-12 19:21:03.801 [INFO][3168] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"beb802b4-3a57-47fd-8926-0a0a614291df", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a2:32:34:fb:6b:30", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:03.817098 env[1379]: 2024-02-12 19:21:03.814 [INFO][3168] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:21:03.837000 audit[3202]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3202 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:21:03.837000 audit[3202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffc330d8c0 a2=0 a3=ffffa806efa8 items=0 ppid=2622 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.837000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:21:03.841373 env[1379]: time="2024-02-12T19:21:03.841309160Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:21:03.841475 env[1379]: time="2024-02-12T19:21:03.841383278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:21:03.841475 env[1379]: time="2024-02-12T19:21:03.841411997Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:21:03.841836 env[1379]: time="2024-02-12T19:21:03.841776230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24 pid=3210 runtime=io.containerd.runc.v2 Feb 12 19:21:03.867836 systemd[1]: Started cri-containerd-2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24.scope. Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.879000 audit: BPF prog-id=109 op=LOAD Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3210 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386461613562623034363831326634613863333730366262643561 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3210 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386461613562623034363831326634613863333730366262643561 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit: BPF prog-id=110 op=LOAD Feb 12 19:21:03.880000 audit[3220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3210 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386461613562623034363831326634613863333730366262643561 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit: BPF prog-id=111 op=LOAD Feb 12 19:21:03.880000 audit[3220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3210 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386461613562623034363831326634613863333730366262643561 Feb 12 19:21:03.880000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:21:03.880000 audit: BPF prog-id=110 op=UNLOAD Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:03.880000 audit: BPF prog-id=112 op=LOAD Feb 12 19:21:03.880000 audit[3220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3210 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386461613562623034363831326634613863333730366262643561 Feb 12 19:21:03.899441 env[1379]: time="2024-02-12T19:21:03.899323649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:beb802b4-3a57-47fd-8926-0a0a614291df,Namespace:default,Attempt:0,} returns sandbox id \"2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24\"" Feb 12 19:21:03.902209 env[1379]: time="2024-02-12T19:21:03.902169071Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:21:04.217749 kubelet[1953]: E0212 19:21:04.217581 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:04.346911 systemd[1]: run-containerd-runc-k8s.io-2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24-runc.wCN4YC.mount: Deactivated successfully. Feb 12 19:21:05.038890 systemd-networkd[1523]: cali60e51b789ff: Gained IPv6LL Feb 12 19:21:05.217849 kubelet[1953]: E0212 19:21:05.217818 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:06.218820 kubelet[1953]: E0212 19:21:06.218766 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:06.508311 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3521756196.mount: Deactivated successfully. Feb 12 19:21:07.219554 kubelet[1953]: E0212 19:21:07.219503 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:08.127132 systemd[1]: run-containerd-runc-k8s.io-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7-runc.Vtn9Kc.mount: Deactivated successfully. Feb 12 19:21:08.219800 kubelet[1953]: E0212 19:21:08.219751 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:08.517654 env[1379]: time="2024-02-12T19:21:08.517305623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:08.529581 env[1379]: time="2024-02-12T19:21:08.529541715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:08.534792 env[1379]: time="2024-02-12T19:21:08.534757097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:08.539657 env[1379]: time="2024-02-12T19:21:08.539623047Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:08.540526 env[1379]: time="2024-02-12T19:21:08.540498590Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 12 19:21:08.543192 env[1379]: time="2024-02-12T19:21:08.543157621Z" level=info msg="CreateContainer within sandbox \"2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:21:08.564004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount29160200.mount: Deactivated successfully. Feb 12 19:21:08.586532 env[1379]: time="2024-02-12T19:21:08.586481412Z" level=info msg="CreateContainer within sandbox \"2f8daa5bb046812f4a8c3706bbd5ae61f986a19fe26b0d4eddfb2b01b3bb2a24\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8e7445c634168eb09ff5853e087db4378cba86ac81cf1195f255cd4ffb3f32c0\"" Feb 12 19:21:08.587502 env[1379]: time="2024-02-12T19:21:08.587468073Z" level=info msg="StartContainer for \"8e7445c634168eb09ff5853e087db4378cba86ac81cf1195f255cd4ffb3f32c0\"" Feb 12 19:21:08.602251 systemd[1]: Started cri-containerd-8e7445c634168eb09ff5853e087db4378cba86ac81cf1195f255cd4ffb3f32c0.scope. Feb 12 19:21:08.620743 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:21:08.620854 kernel: audit: type=1400 audit(1707765668.614:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.654213 kernel: audit: type=1400 audit(1707765668.614:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671539 kernel: audit: type=1400 audit(1707765668.614:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.689392 kernel: audit: type=1400 audit(1707765668.614:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.708258 kernel: audit: type=1400 audit(1707765668.614:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.727291 kernel: audit: type=1400 audit(1707765668.614:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.747029 kernel: audit: type=1400 audit(1707765668.614:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.766084 kernel: audit: type=1400 audit(1707765668.614:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.783859 kernel: audit: type=1400 audit(1707765668.614:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.784000 kernel: audit: type=1400 audit(1707765668.619:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.801560 env[1379]: time="2024-02-12T19:21:08.801501597Z" level=info msg="StartContainer for \"8e7445c634168eb09ff5853e087db4378cba86ac81cf1195f255cd4ffb3f32c0\" returns successfully" Feb 12 19:21:08.619000 audit: BPF prog-id=113 op=LOAD Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3210 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373434356336333431363865623039666635383533653038376462 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3210 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373434356336333431363865623039666635383533653038376462 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.636000 audit: BPF prog-id=114 op=LOAD Feb 12 19:21:08.636000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3210 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373434356336333431363865623039666635383533653038376462 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.653000 audit: BPF prog-id=115 op=LOAD Feb 12 19:21:08.653000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3210 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373434356336333431363865623039666635383533653038376462 Feb 12 19:21:08.670000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:21:08.670000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:08.671000 audit: BPF prog-id=116 op=LOAD Feb 12 19:21:08.671000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3210 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373434356336333431363865623039666635383533653038376462 Feb 12 19:21:08.799000 audit[3301]: AVC avc: denied { search } for pid=3301 comm="rpcbind" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:21:08.799000 audit[3301]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8ce2f000 a2=0 a3=0 items=0 ppid=3284 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 key=(null) Feb 12 19:21:08.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:21:08.844000 audit[3308]: AVC avc: denied { search } for pid=3308 comm="dbus-daemon" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:21:08.844000 audit[3308]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9389f000 a2=0 a3=0 items=0 ppid=3284 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 key=(null) Feb 12 19:21:08.844000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:21:08.847000 audit[3309]: AVC avc: denied { watch } for pid=3309 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c380,c560 tclass=dir permissive=0 Feb 12 19:21:08.847000 audit[3309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf725e380 a2=2c8 a3=aaaaf7249a60 items=0 ppid=3284 pid=3309 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 key=(null) Feb 12 19:21:08.847000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:21:08.854000 audit[3310]: AVC avc: denied { read } for pid=3310 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21116 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:21:08.854000 audit[3310]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff834da570 a2=80000 a3=0 items=0 ppid=3284 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 key=(null) Feb 12 19:21:08.854000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:21:08.854000 audit[3310]: AVC avc: denied { search } for pid=3310 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:21:08.854000 audit[3310]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8286f000 a2=0 a3=0 items=0 ppid=3284 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c560 key=(null) Feb 12 19:21:08.854000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:21:09.220947 kubelet[1953]: E0212 19:21:09.220896 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:09.394360 kubelet[1953]: I0212 19:21:09.394327 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.754224732 podCreationTimestamp="2024-02-12 19:21:03 +0000 UTC" firstStartedPulling="2024-02-12 19:21:03.901483085 +0000 UTC m=+45.354185199" lastFinishedPulling="2024-02-12 19:21:08.541547891 +0000 UTC m=+49.994250005" observedRunningTime="2024-02-12 19:21:09.394152341 +0000 UTC m=+50.846854455" watchObservedRunningTime="2024-02-12 19:21:09.394289538 +0000 UTC m=+50.846991612" Feb 12 19:21:09.405000 audit[3315]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:09.405000 audit[3315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc6a6b2c0 a2=0 a3=ffff8071d6c0 items=0 ppid=2181 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:09.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:09.408000 audit[3315]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:09.408000 audit[3315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffc6a6b2c0 a2=0 a3=ffff8071d6c0 items=0 ppid=2181 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:09.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:10.222068 kubelet[1953]: E0212 19:21:10.222015 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:11.222926 kubelet[1953]: E0212 19:21:11.222883 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:12.223231 kubelet[1953]: E0212 19:21:12.223198 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:13.223889 kubelet[1953]: E0212 19:21:13.223862 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:14.224324 kubelet[1953]: E0212 19:21:14.224292 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:15.225641 kubelet[1953]: E0212 19:21:15.225607 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:16.226805 kubelet[1953]: E0212 19:21:16.226772 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:17.227623 kubelet[1953]: E0212 19:21:17.227585 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:18.227868 kubelet[1953]: E0212 19:21:18.227837 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:19.157751 kubelet[1953]: E0212 19:21:19.157697 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:19.163766 env[1379]: time="2024-02-12T19:21:19.163726217Z" level=info msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" Feb 12 19:21:19.228870 kubelet[1953]: E0212 19:21:19.228835 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.202 [WARNING][3347] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--59xtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3821f86-0264-4168-9734-5e7323fa14b3", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac", Pod:"csi-node-driver-59xtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia549e8dffcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.202 [INFO][3347] k8s.go 578: Cleaning up netns ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.202 [INFO][3347] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" iface="eth0" netns="" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.202 [INFO][3347] k8s.go 585: Releasing IP address(es) ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.202 [INFO][3347] utils.go 188: Calico CNI releasing IP address ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.218 [INFO][3353] ipam_plugin.go 415: Releasing address using handleID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.219 [INFO][3353] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.219 [INFO][3353] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.229 [WARNING][3353] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.229 [INFO][3353] ipam_plugin.go 443: Releasing address using workloadID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.231 [INFO][3353] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:19.233048 env[1379]: 2024-02-12 19:21:19.231 [INFO][3347] k8s.go 591: Teardown processing complete. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.233452 env[1379]: time="2024-02-12T19:21:19.233082181Z" level=info msg="TearDown network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" successfully" Feb 12 19:21:19.233452 env[1379]: time="2024-02-12T19:21:19.233112981Z" level=info msg="StopPodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" returns successfully" Feb 12 19:21:19.233749 env[1379]: time="2024-02-12T19:21:19.233691812Z" level=info msg="RemovePodSandbox for \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" Feb 12 19:21:19.233879 env[1379]: time="2024-02-12T19:21:19.233839969Z" level=info msg="Forcibly stopping sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\"" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.275 [WARNING][3371] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--59xtq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3821f86-0264-4168-9734-5e7323fa14b3", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"5b894097e3067fb46d9ed50d84bb058560fc7607bfdacc2bfe34bd99b7c6ddac", Pod:"csi-node-driver-59xtq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia549e8dffcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.275 [INFO][3371] k8s.go 578: Cleaning up netns ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.275 [INFO][3371] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" iface="eth0" netns="" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.275 [INFO][3371] k8s.go 585: Releasing IP address(es) ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.275 [INFO][3371] utils.go 188: Calico CNI releasing IP address ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.292 [INFO][3379] ipam_plugin.go 415: Releasing address using handleID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.292 [INFO][3379] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.292 [INFO][3379] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.305 [WARNING][3379] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.306 [INFO][3379] ipam_plugin.go 443: Releasing address using workloadID ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" HandleID="k8s-pod-network.88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Workload="10.200.20.48-k8s-csi--node--driver--59xtq-eth0" Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.315 [INFO][3379] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:19.317852 env[1379]: 2024-02-12 19:21:19.316 [INFO][3371] k8s.go 591: Teardown processing complete. ContainerID="88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b" Feb 12 19:21:19.318257 env[1379]: time="2024-02-12T19:21:19.317889186Z" level=info msg="TearDown network for sandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" successfully" Feb 12 19:21:19.327493 env[1379]: time="2024-02-12T19:21:19.327450438Z" level=info msg="RemovePodSandbox \"88a01e4bebdfa69ccf6b43bd2c048b9e992877ab97a17459b7e39c612a34c34b\" returns successfully" Feb 12 19:21:19.328084 env[1379]: time="2024-02-12T19:21:19.328057748Z" level=info msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.365 [WARNING][3398] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a2654ac7-efc3-4361-abb7-61568780f7cd", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01", Pod:"nginx-deployment-845c78c8b9-hkjf6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8d2e8d7f10a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.365 [INFO][3398] k8s.go 578: Cleaning up netns ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.365 [INFO][3398] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" iface="eth0" netns="" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.365 [INFO][3398] k8s.go 585: Releasing IP address(es) ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.365 [INFO][3398] utils.go 188: Calico CNI releasing IP address ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.382 [INFO][3404] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.382 [INFO][3404] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.382 [INFO][3404] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.396 [WARNING][3404] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.396 [INFO][3404] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.398 [INFO][3404] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:19.401408 env[1379]: 2024-02-12 19:21:19.399 [INFO][3398] k8s.go 591: Teardown processing complete. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.401970 env[1379]: time="2024-02-12T19:21:19.401940323Z" level=info msg="TearDown network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" successfully" Feb 12 19:21:19.402038 env[1379]: time="2024-02-12T19:21:19.402021721Z" level=info msg="StopPodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" returns successfully" Feb 12 19:21:19.402445 env[1379]: time="2024-02-12T19:21:19.402418595Z" level=info msg="RemovePodSandbox for \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" Feb 12 19:21:19.402571 env[1379]: time="2024-02-12T19:21:19.402534153Z" level=info msg="Forcibly stopping sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\"" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.440 [WARNING][3425] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a2654ac7-efc3-4361-abb7-61568780f7cd", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"68b3183f3838b3b425d3f7920dbc21bc3dfa90ce3bde827b8a1abc729bc93b01", Pod:"nginx-deployment-845c78c8b9-hkjf6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8d2e8d7f10a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.441 [INFO][3425] k8s.go 578: Cleaning up netns ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.441 [INFO][3425] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" iface="eth0" netns="" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.441 [INFO][3425] k8s.go 585: Releasing IP address(es) ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.441 [INFO][3425] utils.go 188: Calico CNI releasing IP address ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.457 [INFO][3431] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.457 [INFO][3431] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.457 [INFO][3431] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.467 [WARNING][3431] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.467 [INFO][3431] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" HandleID="k8s-pod-network.ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Workload="10.200.20.48-k8s-nginx--deployment--845c78c8b9--hkjf6-eth0" Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.469 [INFO][3431] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:19.472508 env[1379]: 2024-02-12 19:21:19.470 [INFO][3425] k8s.go 591: Teardown processing complete. ContainerID="ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4" Feb 12 19:21:19.473017 env[1379]: time="2024-02-12T19:21:19.472976941Z" level=info msg="TearDown network for sandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" successfully" Feb 12 19:21:19.482820 env[1379]: time="2024-02-12T19:21:19.482780109Z" level=info msg="RemovePodSandbox \"ed52c7fc88fcad406d3549f3fd06d766e195e0550bb118ef1e8a5f88ba216fc4\" returns successfully" Feb 12 19:21:20.229839 kubelet[1953]: E0212 19:21:20.229795 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:21.230445 kubelet[1953]: E0212 19:21:21.230408 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:22.231505 kubelet[1953]: E0212 19:21:22.231470 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:23.232741 kubelet[1953]: E0212 19:21:23.232695 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:24.234027 kubelet[1953]: E0212 19:21:24.233996 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:25.235103 kubelet[1953]: E0212 19:21:25.235068 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:26.236495 kubelet[1953]: E0212 19:21:26.236464 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:27.237636 kubelet[1953]: E0212 19:21:27.237603 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:28.238044 kubelet[1953]: E0212 19:21:28.238007 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:29.238921 kubelet[1953]: E0212 19:21:29.238890 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:30.240285 kubelet[1953]: E0212 19:21:30.240257 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:31.241665 kubelet[1953]: E0212 19:21:31.241630 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:32.242636 kubelet[1953]: E0212 19:21:32.242604 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:33.208162 kubelet[1953]: I0212 19:21:33.208128 1953 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:21:33.213102 systemd[1]: Created slice kubepods-besteffort-podb790e168_ea98_434c_9102_f4757da17e63.slice. Feb 12 19:21:33.242790 kubelet[1953]: E0212 19:21:33.242758 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:33.369091 kubelet[1953]: I0212 19:21:33.369056 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxx86\" (UniqueName: \"kubernetes.io/projected/b790e168-ea98-434c-9102-f4757da17e63-kube-api-access-vxx86\") pod \"test-pod-1\" (UID: \"b790e168-ea98-434c-9102-f4757da17e63\") " pod="default/test-pod-1" Feb 12 19:21:33.369250 kubelet[1953]: I0212 19:21:33.369109 1953 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-800c8305-5996-46b5-8eba-18abceeafbf3\" (UniqueName: \"kubernetes.io/nfs/b790e168-ea98-434c-9102-f4757da17e63-pvc-800c8305-5996-46b5-8eba-18abceeafbf3\") pod \"test-pod-1\" (UID: \"b790e168-ea98-434c-9102-f4757da17e63\") " pod="default/test-pod-1" Feb 12 19:21:33.617559 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:21:33.617722 kernel: audit: type=1400 audit(1707765693.609:806): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.617761 kernel: Failed to create system directory netfs Feb 12 19:21:33.609000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.609000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.666497 kernel: Failed to create system directory netfs Feb 12 19:21:33.666618 kernel: audit: type=1400 audit(1707765693.609:806): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.666647 kernel: Failed to create system directory netfs Feb 12 19:21:33.609000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.671517 kernel: audit: type=1400 audit(1707765693.609:806): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.671595 kernel: Failed to create system directory netfs Feb 12 19:21:33.609000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.715977 kernel: audit: type=1400 audit(1707765693.609:806): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.609000 audit[3453]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0b6f65e0 a1=12c14 a2=aaaae8a5e028 a3=aaab0b6e7010 items=0 ppid=553 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:33.744675 kernel: audit: type=1300 audit(1707765693.609:806): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0b6f65e0 a1=12c14 a2=aaaae8a5e028 a3=aaab0b6e7010 items=0 ppid=553 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:33.609000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:33.756944 kernel: audit: type=1327 audit(1707765693.609:806): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.790941 kernel: Failed to create system directory fscache Feb 12 19:21:33.791045 kernel: audit: type=1400 audit(1707765693.757:807): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.791079 kernel: Failed to create system directory fscache Feb 12 19:21:33.791104 kernel: audit: type=1400 audit(1707765693.757:807): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.820776 kernel: Failed to create system directory fscache Feb 12 19:21:33.820890 kernel: audit: type=1400 audit(1707765693.757:807): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.845488 kernel: Failed to create system directory fscache Feb 12 19:21:33.845602 kernel: audit: type=1400 audit(1707765693.757:807): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.865363 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.875341 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.883313 kernel: Failed to create system directory fscache Feb 12 19:21:33.888010 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.892669 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.898510 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.907739 kernel: Failed to create system directory fscache Feb 12 19:21:33.907829 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.912728 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.917277 kernel: Failed to create system directory fscache Feb 12 19:21:33.757000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.920758 kernel: FS-Cache: Loaded Feb 12 19:21:33.757000 audit[3453]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0b909210 a1=4c344 a2=aaaae8a5e028 a3=aaab0b6e7010 items=0 ppid=553 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:33.757000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.993196 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.993279 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.993378 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.001776 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.001867 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.010628 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.010935 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.019582 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.019694 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.028188 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.028263 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.036208 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.040853 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.040921 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.048886 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.048944 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.057517 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.057582 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.065445 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.065506 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.073254 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.073340 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.081235 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.081303 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.089805 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.094245 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.094337 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.101990 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.102070 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.109934 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.109993 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.117573 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.117630 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.125166 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.125228 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.132864 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.132983 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.140602 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.140672 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.148580 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.148668 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.156039 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.156116 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.159668 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.167450 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.167511 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.175281 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.175340 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.182733 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.182800 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.189909 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.189978 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.197567 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.201627 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.201692 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.208942 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.208974 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.216544 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.216599 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.223845 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.223937 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.227537 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.234758 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.234815 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.242107 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.242165 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.243256 kubelet[1953]: E0212 19:21:34.243203 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.249656 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.253899 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.253997 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.261501 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.261554 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.268827 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.268857 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.272376 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.276320 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.283697 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.283754 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.291250 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.291311 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.298865 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.298933 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.307118 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.307177 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.314483 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.314515 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.321957 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.322010 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.329297 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.329344 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.332907 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.336539 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.340282 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.348390 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.348443 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.355913 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.359989 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.360035 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.363601 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.367244 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.374576 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.374682 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.378148 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.381804 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.385500 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.389206 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.396520 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.396593 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.403696 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.403765 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.411330 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.411382 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.418565 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.418631 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.422131 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.425824 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.433735 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.433829 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.441245 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.441308 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.444847 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.448511 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.452065 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.455702 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.463395 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.463448 kernel: Failed to create system directory sunrpc Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:33.978000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.470762 kernel: Failed to create system directory sunrpc Feb 12 19:21:34.482366 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:21:34.482466 kernel: RPC: Registered udp transport module. Feb 12 19:21:34.482497 kernel: RPC: Registered tcp transport module. Feb 12 19:21:34.490797 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:21:33.978000 audit[3453]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0b955560 a1=fbb6c a2=aaaae8a5e028 a3=aaab0b6e7010 items=6 ppid=553 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:33.978000 audit: CWD cwd="/" Feb 12 19:21:33.978000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PATH item=1 name=(null) inode=21482 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PATH item=2 name=(null) inode=21482 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PATH item=3 name=(null) inode=21483 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PATH item=4 name=(null) inode=21482 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PATH item=5 name=(null) inode=21484 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:33.978000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.591899 kernel: Failed to create system directory nfs Feb 12 19:21:34.591982 kernel: Failed to create system directory nfs Feb 12 19:21:34.592010 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.598978 kernel: Failed to create system directory nfs Feb 12 19:21:34.599018 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.606000 kernel: Failed to create system directory nfs Feb 12 19:21:34.606060 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.612965 kernel: Failed to create system directory nfs Feb 12 19:21:34.613017 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.620006 kernel: Failed to create system directory nfs Feb 12 19:21:34.620047 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.626969 kernel: Failed to create system directory nfs Feb 12 19:21:34.627023 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.630337 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.633800 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.641188 kernel: Failed to create system directory nfs Feb 12 19:21:34.641278 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.648144 kernel: Failed to create system directory nfs Feb 12 19:21:34.648215 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.655159 kernel: Failed to create system directory nfs Feb 12 19:21:34.655235 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.658626 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.662110 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.665544 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.669276 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.672994 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.676654 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.680411 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.684098 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.687555 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.694764 kernel: Failed to create system directory nfs Feb 12 19:21:34.694828 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.701847 kernel: Failed to create system directory nfs Feb 12 19:21:34.701929 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.705375 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.708770 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.715717 kernel: Failed to create system directory nfs Feb 12 19:21:34.715763 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.722673 kernel: Failed to create system directory nfs Feb 12 19:21:34.722742 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.729748 kernel: Failed to create system directory nfs Feb 12 19:21:34.729820 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.737072 kernel: Failed to create system directory nfs Feb 12 19:21:34.737132 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.740510 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.747818 kernel: Failed to create system directory nfs Feb 12 19:21:34.747877 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.751189 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.754676 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.761555 kernel: Failed to create system directory nfs Feb 12 19:21:34.761618 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.765022 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.768481 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.771863 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.775285 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.778762 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.785528 kernel: Failed to create system directory nfs Feb 12 19:21:34.785558 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.579000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.792348 kernel: Failed to create system directory nfs Feb 12 19:21:34.579000 audit[3453]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0ba81b40 a1=ae35c a2=aaaae8a5e028 a3=aaab0b6e7010 items=0 ppid=553 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:34.579000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:34.805796 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.866262 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.866341 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.870291 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.874164 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.874238 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.881276 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.884857 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.888614 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.892457 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.896337 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.902240 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.906106 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.909742 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.914237 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.914302 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.922051 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.922102 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.929558 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.929590 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.937088 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.937139 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.944440 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.944487 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.951879 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.951925 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.958986 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.959012 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.966677 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.970934 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.970982 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.978072 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.978119 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.985721 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.985777 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.993271 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.993324 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.000881 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.000930 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.008090 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.008152 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.015495 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.019472 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.019552 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.026488 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.026578 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.033927 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.033989 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.040885 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.040944 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.047922 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.047971 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.054826 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.054882 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.062209 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.062283 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.067323 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.074007 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.074061 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.081065 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.081124 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.088323 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.088417 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.091935 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.095507 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.099088 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.106464 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.106541 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.110166 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.113723 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.120688 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.120771 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.128271 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.128415 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.135313 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.135379 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.142475 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.142563 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.152292 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.152349 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.159401 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.159435 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.166808 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.166861 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.173897 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.173956 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.177726 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.184775 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.184822 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.191871 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.191921 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.198762 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.202606 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.202664 kernel: Failed to create system directory nfs4 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:34.851000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.210900 kernel: Failed to create system directory nfs4 Feb 12 19:21:35.244259 kubelet[1953]: E0212 19:21:35.244184 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:35.321546 kernel: NFS: Registering the id_resolver key type Feb 12 19:21:35.321668 kernel: Key type id_resolver registered Feb 12 19:21:35.321695 kernel: Key type id_legacy registered Feb 12 19:21:34.851000 audit[3458]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb11ab010 a1=167c04 a2=aaaaca8be028 a3=aaaae8534010 items=0 ppid=553 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:34.851000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.371727 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.371791 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.379100 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.379132 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.386544 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.386589 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.394315 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.394378 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.402639 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.406689 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.411042 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.411113 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.418837 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.418916 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.426585 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.426652 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.434266 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.434343 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.442096 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.442164 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.449950 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.450004 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.457614 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.457666 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.465362 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.465456 kernel: Failed to create system directory rpcgss Feb 12 19:21:35.364000 audit[3460]: AVC avc: denied { confidentiality } for pid=3460 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:35.364000 audit[3460]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff82203010 a1=3e09c a2=aaaac9cde028 a3=aaaace1ea010 items=0 ppid=553 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:35.364000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:21:35.817136 nfsidmap[3467]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-6e8117160a' Feb 12 19:21:35.829014 nfsidmap[3468]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-6e8117160a' Feb 12 19:21:35.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.838000 audit[1479]: AVC avc: denied { watch_reads } for pid=1479 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.838000 audit[1479]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf5e29300 a2=10 a3=0 items=0 ppid=1 pid=1479 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:35.838000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:35.838000 audit[1479]: AVC avc: denied { watch_reads } for pid=1479 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.838000 audit[1479]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf5e29300 a2=10 a3=0 items=0 ppid=1 pid=1479 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:35.838000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:35.838000 audit[1479]: AVC avc: denied { watch_reads } for pid=1479 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:35.838000 audit[1479]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf5e29300 a2=10 a3=0 items=0 ppid=1 pid=1479 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:35.838000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:35.918202 env[1379]: time="2024-02-12T19:21:35.918148226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b790e168-ea98-434c-9102-f4757da17e63,Namespace:default,Attempt:0,}" Feb 12 19:21:36.071084 systemd-networkd[1523]: cali5ec59c6bf6e: Link UP Feb 12 19:21:36.084700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:21:36.084785 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:21:36.086253 systemd-networkd[1523]: cali5ec59c6bf6e: Gained carrier Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:35.996 [INFO][3470] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-test--pod--1-eth0 default b790e168-ea98-434c-9102-f4757da17e63 1443 0 2024-02-12 19:21:04 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:35.997 [INFO][3470] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.026 [INFO][3482] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" HandleID="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Workload="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.040 [INFO][3482] ipam_plugin.go 268: Auto assigning IP ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" HandleID="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Workload="10.200.20.48-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b3a80), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"test-pod-1", "timestamp":"2024-02-12 19:21:36.026287998 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.041 [INFO][3482] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.041 [INFO][3482] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.041 [INFO][3482] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.044 [INFO][3482] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.047 [INFO][3482] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.051 [INFO][3482] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.052 [INFO][3482] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.054 [INFO][3482] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.054 [INFO][3482] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.055 [INFO][3482] ipam.go 1682: Creating new handle: k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42 Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.058 [INFO][3482] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.065 [INFO][3482] ipam.go 1216: Successfully claimed IPs: [192.168.41.4/26] block=192.168.41.0/26 handle="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.065 [INFO][3482] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.4/26] handle="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" host="10.200.20.48" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.065 [INFO][3482] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.065 [INFO][3482] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.41.4/26] IPv6=[] ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" HandleID="k8s-pod-network.f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Workload="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.066 [INFO][3470] k8s.go 385: Populated endpoint ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b790e168-ea98-434c-9102-f4757da17e63", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 21, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:36.096570 env[1379]: 2024-02-12 19:21:36.066 [INFO][3470] k8s.go 386: Calico CNI using IPs: [192.168.41.4/32] ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.097238 env[1379]: 2024-02-12 19:21:36.066 [INFO][3470] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.097238 env[1379]: 2024-02-12 19:21:36.086 [INFO][3470] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.097238 env[1379]: 2024-02-12 19:21:36.087 [INFO][3470] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b790e168-ea98-434c-9102-f4757da17e63", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 21, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"86:4c:a1:21:19:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:36.097238 env[1379]: 2024-02-12 19:21:36.092 [INFO][3470] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Feb 12 19:21:36.104000 audit[3497]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:21:36.104000 audit[3497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19080 a0=3 a1=ffffde3760e0 a2=0 a3=ffffb82befa8 items=0 ppid=2622 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.104000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:21:36.116716 env[1379]: time="2024-02-12T19:21:36.116646962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:21:36.116874 env[1379]: time="2024-02-12T19:21:36.116849359Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:21:36.116969 env[1379]: time="2024-02-12T19:21:36.116947798Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:21:36.117280 env[1379]: time="2024-02-12T19:21:36.117249595Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42 pid=3511 runtime=io.containerd.runc.v2 Feb 12 19:21:36.130410 systemd[1]: Started cri-containerd-f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42.scope. Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.141000 audit: BPF prog-id=117 op=LOAD Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3511 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396131343835663265363330373438613434393766326133373536 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3511 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396131343835663265363330373438613434393766326133373536 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit: BPF prog-id=118 op=LOAD Feb 12 19:21:36.142000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3511 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396131343835663265363330373438613434393766326133373536 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit: BPF prog-id=119 op=LOAD Feb 12 19:21:36.142000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3511 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396131343835663265363330373438613434393766326133373536 Feb 12 19:21:36.142000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:21:36.142000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.142000 audit: BPF prog-id=120 op=LOAD Feb 12 19:21:36.142000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3511 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396131343835663265363330373438613434393766326133373536 Feb 12 19:21:36.162474 env[1379]: time="2024-02-12T19:21:36.162437396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b790e168-ea98-434c-9102-f4757da17e63,Namespace:default,Attempt:0,} returns sandbox id \"f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42\"" Feb 12 19:21:36.164403 env[1379]: time="2024-02-12T19:21:36.164374212Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:21:36.244453 kubelet[1953]: E0212 19:21:36.244365 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:36.549460 env[1379]: time="2024-02-12T19:21:36.549417737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:36.555229 env[1379]: time="2024-02-12T19:21:36.555190706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:36.559965 env[1379]: time="2024-02-12T19:21:36.559919127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:36.563278 env[1379]: time="2024-02-12T19:21:36.563242366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:36.563836 env[1379]: time="2024-02-12T19:21:36.563807919Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:21:36.566054 env[1379]: time="2024-02-12T19:21:36.566026292Z" level=info msg="CreateContainer within sandbox \"f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:21:36.613805 env[1379]: time="2024-02-12T19:21:36.613748942Z" level=info msg="CreateContainer within sandbox \"f89a1485f2e630748a4497f2a37568707e888a4f562735de7eb2bda0c190ac42\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8886fbccba39e915d34d8e01e8277ce193235fa8e56acef654f45a0e16148a96\"" Feb 12 19:21:36.614596 env[1379]: time="2024-02-12T19:21:36.614556852Z" level=info msg="StartContainer for \"8886fbccba39e915d34d8e01e8277ce193235fa8e56acef654f45a0e16148a96\"" Feb 12 19:21:36.628874 systemd[1]: Started cri-containerd-8886fbccba39e915d34d8e01e8277ce193235fa8e56acef654f45a0e16148a96.scope. Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.641000 audit: BPF prog-id=121 op=LOAD Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3511 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383666626363626133396539313564333464386530316538323737 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3511 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383666626363626133396539313564333464386530316538323737 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit: BPF prog-id=122 op=LOAD Feb 12 19:21:36.642000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3511 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383666626363626133396539313564333464386530316538323737 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit: BPF prog-id=123 op=LOAD Feb 12 19:21:36.642000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3511 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383666626363626133396539313564333464386530316538323737 Feb 12 19:21:36.642000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:21:36.642000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:36.642000 audit: BPF prog-id=124 op=LOAD Feb 12 19:21:36.642000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3511 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:36.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383666626363626133396539313564333464386530316538323737 Feb 12 19:21:36.672312 env[1379]: time="2024-02-12T19:21:36.672245260Z" level=info msg="StartContainer for \"8886fbccba39e915d34d8e01e8277ce193235fa8e56acef654f45a0e16148a96\" returns successfully" Feb 12 19:21:37.245247 kubelet[1953]: E0212 19:21:37.245028 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:37.422951 systemd-networkd[1523]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:21:37.443529 kubelet[1953]: I0212 19:21:37.443497 1953 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.043177819 podCreationTimestamp="2024-02-12 19:21:04 +0000 UTC" firstStartedPulling="2024-02-12 19:21:36.163836019 +0000 UTC m=+77.616538093" lastFinishedPulling="2024-02-12 19:21:36.564107756 +0000 UTC m=+78.016809870" observedRunningTime="2024-02-12 19:21:37.443379957 +0000 UTC m=+78.896082031" watchObservedRunningTime="2024-02-12 19:21:37.443449596 +0000 UTC m=+78.896151710" Feb 12 19:21:38.125017 systemd[1]: run-containerd-runc-k8s.io-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7-runc.QMGdwe.mount: Deactivated successfully. Feb 12 19:21:38.245508 kubelet[1953]: E0212 19:21:38.245445 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:39.157088 kubelet[1953]: E0212 19:21:39.157039 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:39.245636 kubelet[1953]: E0212 19:21:39.245590 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:40.246490 kubelet[1953]: E0212 19:21:40.246449 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:41.246713 kubelet[1953]: E0212 19:21:41.246673 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:42.247433 kubelet[1953]: E0212 19:21:42.247401 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:43.247975 kubelet[1953]: E0212 19:21:43.247942 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:44.248677 kubelet[1953]: E0212 19:21:44.248644 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:45.250110 kubelet[1953]: E0212 19:21:45.250077 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:46.250296 kubelet[1953]: E0212 19:21:46.250245 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:47.250791 kubelet[1953]: E0212 19:21:47.250755 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:48.251571 kubelet[1953]: E0212 19:21:48.251540 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:49.252087 kubelet[1953]: E0212 19:21:49.252037 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:50.252556 kubelet[1953]: E0212 19:21:50.252500 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:51.252601 kubelet[1953]: E0212 19:21:51.252577 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:52.253920 kubelet[1953]: E0212 19:21:52.253891 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:53.254683 kubelet[1953]: E0212 19:21:53.254659 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:54.255375 kubelet[1953]: E0212 19:21:54.255348 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:55.127468 kubelet[1953]: E0212 19:21:55.127431 1953 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:34330->10.200.20.21:2379: read: connection timed out" Feb 12 19:21:55.256053 kubelet[1953]: E0212 19:21:55.256025 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:56.256459 kubelet[1953]: E0212 19:21:56.256419 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:57.257084 kubelet[1953]: E0212 19:21:57.257059 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:58.258091 kubelet[1953]: E0212 19:21:58.258059 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:59.157620 kubelet[1953]: E0212 19:21:59.157589 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:59.258973 kubelet[1953]: E0212 19:21:59.258942 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:00.259800 kubelet[1953]: E0212 19:22:00.259769 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:01.261119 kubelet[1953]: E0212 19:22:01.261088 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:02.262021 kubelet[1953]: E0212 19:22:02.261928 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:03.262772 kubelet[1953]: E0212 19:22:03.262735 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:04.263740 kubelet[1953]: E0212 19:22:04.263683 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:05.127881 kubelet[1953]: E0212 19:22:05.127844 1953 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:05.264295 kubelet[1953]: E0212 19:22:05.264270 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:06.265058 kubelet[1953]: E0212 19:22:06.265010 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:07.265666 kubelet[1953]: E0212 19:22:07.265629 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:08.125382 systemd[1]: run-containerd-runc-k8s.io-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7-runc.flIJVX.mount: Deactivated successfully. Feb 12 19:22:08.266795 kubelet[1953]: E0212 19:22:08.266750 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:09.267000 kubelet[1953]: E0212 19:22:09.266957 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:10.267951 kubelet[1953]: E0212 19:22:10.267918 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:11.268630 kubelet[1953]: E0212 19:22:11.268603 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:12.269821 kubelet[1953]: E0212 19:22:12.269786 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:13.270326 kubelet[1953]: E0212 19:22:13.270293 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:14.270627 kubelet[1953]: E0212 19:22:14.270593 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:15.128095 kubelet[1953]: E0212 19:22:15.128052 1953 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:15.271017 kubelet[1953]: E0212 19:22:15.270987 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:16.272095 kubelet[1953]: E0212 19:22:16.272056 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:17.272406 kubelet[1953]: E0212 19:22:17.272373 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:18.273077 kubelet[1953]: E0212 19:22:18.273040 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:19.157431 kubelet[1953]: E0212 19:22:19.157400 1953 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:19.273345 kubelet[1953]: E0212 19:22:19.273314 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:20.274003 kubelet[1953]: E0212 19:22:20.273973 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:21.275343 kubelet[1953]: E0212 19:22:21.275310 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:22.276373 kubelet[1953]: E0212 19:22:22.276344 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:23.277681 kubelet[1953]: E0212 19:22:23.277656 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:24.278831 kubelet[1953]: E0212 19:22:24.278805 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:25.129149 kubelet[1953]: E0212 19:22:25.129109 1953 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:25.279677 kubelet[1953]: E0212 19:22:25.279652 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:26.280834 kubelet[1953]: E0212 19:22:26.280799 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:27.281488 kubelet[1953]: E0212 19:22:27.281443 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:28.282621 kubelet[1953]: E0212 19:22:28.282564 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:29.283619 kubelet[1953]: E0212 19:22:29.283588 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:30.283979 kubelet[1953]: E0212 19:22:30.283949 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:31.284725 kubelet[1953]: E0212 19:22:31.284684 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:32.285368 kubelet[1953]: E0212 19:22:32.285334 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:33.108623 kubelet[1953]: E0212 19:22:33.108505 1953 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.48\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.48?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:33.285742 kubelet[1953]: E0212 19:22:33.285693 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:34.286167 kubelet[1953]: E0212 19:22:34.286135 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:35.129668 kubelet[1953]: E0212 19:22:35.129636 1953 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:35.129894 kubelet[1953]: I0212 19:22:35.129881 1953 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Feb 12 19:22:35.286621 kubelet[1953]: E0212 19:22:35.286592 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:36.287214 kubelet[1953]: E0212 19:22:36.287173 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:37.287818 kubelet[1953]: E0212 19:22:37.287781 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:22:38.126091 systemd[1]: run-containerd-runc-k8s.io-0114e6826618c4d91d82561cd8a437ae556a35b01c3c5f5f7bae47ba8e21a9b7-runc.Taq9VT.mount: Deactivated successfully. Feb 12 19:22:38.288879 kubelet[1953]: E0212 19:22:38.288846 1953 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"