Apr 12 18:34:51.001800 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:34:51.001819 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:34:51.001827 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Apr 12 18:34:51.001833 kernel: printk: bootconsole [pl11] enabled Apr 12 18:34:51.001838 kernel: efi: EFI v2.70 by EDK II Apr 12 18:34:51.001844 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Apr 12 18:34:51.001850 kernel: random: crng init done Apr 12 18:34:51.001856 kernel: ACPI: Early table checksum verification disabled Apr 12 18:34:51.001861 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Apr 12 18:34:51.001867 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001872 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001879 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Apr 12 18:34:51.001884 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001890 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001897 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001902 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001908 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001915 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001921 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Apr 12 18:34:51.001926 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:34:51.001932 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Apr 12 18:34:51.001942 kernel: NUMA: Failed to initialise from firmware Apr 12 18:34:51.001948 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:34:51.001954 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Apr 12 18:34:51.001959 kernel: Zone ranges: Apr 12 18:34:51.001965 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Apr 12 18:34:51.001970 kernel: DMA32 empty Apr 12 18:34:51.001977 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:34:51.001983 kernel: Movable zone start for each node Apr 12 18:34:51.001989 kernel: Early memory node ranges Apr 12 18:34:51.001994 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Apr 12 18:34:51.002000 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Apr 12 18:34:51.002006 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Apr 12 18:34:51.002011 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Apr 12 18:34:51.002017 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Apr 12 18:34:51.002023 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Apr 12 18:34:51.002029 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Apr 12 18:34:51.002034 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Apr 12 18:34:51.002040 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:34:51.002047 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:34:51.002055 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Apr 12 18:34:51.002061 kernel: psci: probing for conduit method from ACPI. Apr 12 18:34:51.002067 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:34:51.002073 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:34:51.002080 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 18:34:51.002086 kernel: psci: SMC Calling Convention v1.4 Apr 12 18:34:51.002092 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Apr 12 18:34:51.002098 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Apr 12 18:34:51.002104 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:34:51.002110 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:34:51.002117 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:34:51.002122 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:34:51.002128 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:34:51.002134 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:34:51.002140 kernel: CPU features: detected: Spectre-BHB Apr 12 18:34:51.002146 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:34:51.002154 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:34:51.002160 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:34:51.002166 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Apr 12 18:34:51.002172 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Apr 12 18:34:51.002178 kernel: Policy zone: Normal Apr 12 18:34:51.002185 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:34:51.002192 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:34:51.002198 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:34:51.002204 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:34:51.002210 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:34:51.006808 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Apr 12 18:34:51.006825 kernel: Memory: 3990256K/4194160K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 203904K reserved, 0K cma-reserved) Apr 12 18:34:51.006832 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:34:51.006839 kernel: trace event string verifier disabled Apr 12 18:34:51.006845 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:34:51.006851 kernel: rcu: RCU event tracing is enabled. Apr 12 18:34:51.006858 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:34:51.006864 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:34:51.006870 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:34:51.006877 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:34:51.006883 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:34:51.006894 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:34:51.006901 kernel: GICv3: 960 SPIs implemented Apr 12 18:34:51.006907 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:34:51.006913 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:34:51.006919 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:34:51.006925 kernel: GICv3: 16 PPIs implemented Apr 12 18:34:51.006931 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Apr 12 18:34:51.006937 kernel: ITS: No ITS available, not enabling LPIs Apr 12 18:34:51.006944 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:34:51.006950 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:34:51.006956 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:34:51.006963 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:34:51.006970 kernel: Console: colour dummy device 80x25 Apr 12 18:34:51.006977 kernel: printk: console [tty1] enabled Apr 12 18:34:51.006983 kernel: ACPI: Core revision 20210730 Apr 12 18:34:51.006990 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:34:51.006996 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:34:51.007003 kernel: LSM: Security Framework initializing Apr 12 18:34:51.007009 kernel: SELinux: Initializing. Apr 12 18:34:51.007016 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:34:51.007022 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:34:51.007030 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Apr 12 18:34:51.007036 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Apr 12 18:34:51.007043 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:34:51.007049 kernel: Remapping and enabling EFI services. Apr 12 18:34:51.007055 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:34:51.007061 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:34:51.007068 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Apr 12 18:34:51.007074 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:34:51.007080 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:34:51.007088 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:34:51.007095 kernel: SMP: Total of 2 processors activated. Apr 12 18:34:51.007101 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:34:51.007108 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Apr 12 18:34:51.007114 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:34:51.007121 kernel: CPU features: detected: CRC32 instructions Apr 12 18:34:51.007127 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:34:51.007134 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:34:51.007140 kernel: CPU features: detected: Privileged Access Never Apr 12 18:34:51.007148 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:34:51.007154 kernel: alternatives: patching kernel code Apr 12 18:34:51.007165 kernel: devtmpfs: initialized Apr 12 18:34:51.007173 kernel: KASLR enabled Apr 12 18:34:51.007180 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:34:51.007187 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:34:51.007193 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:34:51.007200 kernel: SMBIOS 3.1.0 present. Apr 12 18:34:51.007206 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Apr 12 18:34:51.007213 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:34:51.008496 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:34:51.008504 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:34:51.008511 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:34:51.008519 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:34:51.008526 kernel: audit: type=2000 audit(0.085:1): state=initialized audit_enabled=0 res=1 Apr 12 18:34:51.008533 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:34:51.008540 kernel: cpuidle: using governor menu Apr 12 18:34:51.008549 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:34:51.008555 kernel: ASID allocator initialised with 32768 entries Apr 12 18:34:51.008562 kernel: ACPI: bus type PCI registered Apr 12 18:34:51.008569 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:34:51.008576 kernel: Serial: AMBA PL011 UART driver Apr 12 18:34:51.008582 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:34:51.008589 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:34:51.008596 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:34:51.008602 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:34:51.008611 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:34:51.008618 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:34:51.008624 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:34:51.008631 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:34:51.008638 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:34:51.008645 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:34:51.008651 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:34:51.008658 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:34:51.008665 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:34:51.008673 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:34:51.008679 kernel: ACPI: Interpreter enabled Apr 12 18:34:51.008686 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:34:51.008693 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:34:51.008699 kernel: printk: console [ttyAMA0] enabled Apr 12 18:34:51.008706 kernel: printk: bootconsole [pl11] disabled Apr 12 18:34:51.008713 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Apr 12 18:34:51.008719 kernel: iommu: Default domain type: Translated Apr 12 18:34:51.008726 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:34:51.008734 kernel: vgaarb: loaded Apr 12 18:34:51.008741 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:34:51.008748 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:34:51.008754 kernel: PTP clock support registered Apr 12 18:34:51.008761 kernel: Registered efivars operations Apr 12 18:34:51.008767 kernel: No ACPI PMU IRQ for CPU0 Apr 12 18:34:51.008774 kernel: No ACPI PMU IRQ for CPU1 Apr 12 18:34:51.008781 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:34:51.008787 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:34:51.008795 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:34:51.008802 kernel: pnp: PnP ACPI init Apr 12 18:34:51.008809 kernel: pnp: PnP ACPI: found 0 devices Apr 12 18:34:51.008816 kernel: NET: Registered PF_INET protocol family Apr 12 18:34:51.008823 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:34:51.008830 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:34:51.008836 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:34:51.008843 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:34:51.008850 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:34:51.008858 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:34:51.008865 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:34:51.008872 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:34:51.008878 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:34:51.008885 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:34:51.008891 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Apr 12 18:34:51.008898 kernel: kvm [1]: HYP mode not available Apr 12 18:34:51.008905 kernel: Initialise system trusted keyrings Apr 12 18:34:51.008911 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:34:51.008920 kernel: Key type asymmetric registered Apr 12 18:34:51.008926 kernel: Asymmetric key parser 'x509' registered Apr 12 18:34:51.008933 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:34:51.008940 kernel: io scheduler mq-deadline registered Apr 12 18:34:51.008946 kernel: io scheduler kyber registered Apr 12 18:34:51.008953 kernel: io scheduler bfq registered Apr 12 18:34:51.008960 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:34:51.008966 kernel: thunder_xcv, ver 1.0 Apr 12 18:34:51.008973 kernel: thunder_bgx, ver 1.0 Apr 12 18:34:51.008981 kernel: nicpf, ver 1.0 Apr 12 18:34:51.008988 kernel: nicvf, ver 1.0 Apr 12 18:34:51.009115 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:34:51.009179 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:34:50 UTC (1712946890) Apr 12 18:34:51.009188 kernel: efifb: probing for efifb Apr 12 18:34:51.009195 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Apr 12 18:34:51.009202 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Apr 12 18:34:51.009208 kernel: efifb: scrolling: redraw Apr 12 18:34:51.009228 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 18:34:51.009236 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:34:51.009242 kernel: fb0: EFI VGA frame buffer device Apr 12 18:34:51.009249 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Apr 12 18:34:51.009256 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:34:51.009262 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:34:51.009269 kernel: Segment Routing with IPv6 Apr 12 18:34:51.009276 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:34:51.009282 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:34:51.009290 kernel: Key type dns_resolver registered Apr 12 18:34:51.009297 kernel: registered taskstats version 1 Apr 12 18:34:51.009304 kernel: Loading compiled-in X.509 certificates Apr 12 18:34:51.009311 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:34:51.009317 kernel: Key type .fscrypt registered Apr 12 18:34:51.009324 kernel: Key type fscrypt-provisioning registered Apr 12 18:34:51.009331 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:34:51.009338 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:34:51.009344 kernel: ima: No architecture policies found Apr 12 18:34:51.009352 kernel: Freeing unused kernel memory: 36352K Apr 12 18:34:51.009359 kernel: Run /init as init process Apr 12 18:34:51.009365 kernel: with arguments: Apr 12 18:34:51.009372 kernel: /init Apr 12 18:34:51.009379 kernel: with environment: Apr 12 18:34:51.009385 kernel: HOME=/ Apr 12 18:34:51.009392 kernel: TERM=linux Apr 12 18:34:51.009398 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:34:51.009407 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:34:51.009418 systemd[1]: Detected virtualization microsoft. Apr 12 18:34:51.009425 systemd[1]: Detected architecture arm64. Apr 12 18:34:51.009433 systemd[1]: Running in initrd. Apr 12 18:34:51.009440 systemd[1]: No hostname configured, using default hostname. Apr 12 18:34:51.009446 systemd[1]: Hostname set to . Apr 12 18:34:51.009454 systemd[1]: Initializing machine ID from random generator. Apr 12 18:34:51.009461 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:34:51.009469 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:34:51.009476 systemd[1]: Reached target cryptsetup.target. Apr 12 18:34:51.009484 systemd[1]: Reached target paths.target. Apr 12 18:34:51.009491 systemd[1]: Reached target slices.target. Apr 12 18:34:51.009498 systemd[1]: Reached target swap.target. Apr 12 18:34:51.009505 systemd[1]: Reached target timers.target. Apr 12 18:34:51.009512 systemd[1]: Listening on iscsid.socket. Apr 12 18:34:51.009520 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:34:51.009528 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:34:51.009535 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:34:51.009543 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:34:51.009550 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:34:51.009557 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:34:51.009564 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:34:51.009571 systemd[1]: Reached target sockets.target. Apr 12 18:34:51.009579 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:34:51.009586 systemd[1]: Finished network-cleanup.service. Apr 12 18:34:51.009595 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:34:51.009602 systemd[1]: Starting systemd-journald.service... Apr 12 18:34:51.009609 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:34:51.009616 systemd[1]: Starting systemd-resolved.service... Apr 12 18:34:51.009623 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:34:51.009634 systemd-journald[236]: Journal started Apr 12 18:34:51.009675 systemd-journald[236]: Runtime Journal (/run/log/journal/22951ce7ed7b4cde9fde1e006ec18f60) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:34:50.989254 systemd-modules-load[237]: Inserted module 'overlay' Apr 12 18:34:51.040424 systemd[1]: Started systemd-journald.service. Apr 12 18:34:51.040448 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:34:51.033234 systemd-resolved[238]: Positive Trust Anchors: Apr 12 18:34:51.033243 systemd-resolved[238]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:34:51.081868 kernel: Bridge firewalling registered Apr 12 18:34:51.081897 kernel: audit: type=1130 audit(1712946891.058:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.081908 kernel: SCSI subsystem initialized Apr 12 18:34:51.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.033271 systemd-resolved[238]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:34:51.035414 systemd-resolved[238]: Defaulting to hostname 'linux'. Apr 12 18:34:51.136754 kernel: audit: type=1130 audit(1712946891.111:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.047966 systemd-modules-load[237]: Inserted module 'br_netfilter' Apr 12 18:34:51.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.074915 systemd[1]: Started systemd-resolved.service. Apr 12 18:34:51.209979 kernel: audit: type=1130 audit(1712946891.116:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.210002 kernel: audit: type=1130 audit(1712946891.140:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.210012 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:34:51.210023 kernel: audit: type=1130 audit(1712946891.165:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.112039 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:34:51.229513 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:34:51.229533 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:34:51.116591 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:34:51.141393 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:34:51.165748 systemd[1]: Reached target nss-lookup.target. Apr 12 18:34:51.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.225619 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:34:51.238236 systemd-modules-load[237]: Inserted module 'dm_multipath' Apr 12 18:34:51.284268 kernel: audit: type=1130 audit(1712946891.257:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.242577 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:34:51.311344 kernel: audit: type=1130 audit(1712946891.289:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.252872 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:34:51.262525 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:34:51.310874 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:34:51.323344 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:34:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.336331 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:34:51.378823 kernel: audit: type=1130 audit(1712946891.335:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.378846 kernel: audit: type=1130 audit(1712946891.360:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.379062 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:34:51.392871 dracut-cmdline[258]: dracut-dracut-053 Apr 12 18:34:51.398488 dracut-cmdline[258]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:34:51.483245 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:34:51.498237 kernel: iscsi: registered transport (tcp) Apr 12 18:34:51.519071 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:34:51.519134 kernel: QLogic iSCSI HBA Driver Apr 12 18:34:51.555787 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:34:51.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:51.561214 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:34:51.614266 kernel: raid6: neonx8 gen() 13828 MB/s Apr 12 18:34:51.635250 kernel: raid6: neonx8 xor() 10833 MB/s Apr 12 18:34:51.655265 kernel: raid6: neonx4 gen() 13536 MB/s Apr 12 18:34:51.675248 kernel: raid6: neonx4 xor() 10979 MB/s Apr 12 18:34:51.696233 kernel: raid6: neonx2 gen() 13015 MB/s Apr 12 18:34:51.716228 kernel: raid6: neonx2 xor() 10579 MB/s Apr 12 18:34:51.736229 kernel: raid6: neonx1 gen() 10542 MB/s Apr 12 18:34:51.757233 kernel: raid6: neonx1 xor() 8787 MB/s Apr 12 18:34:51.777234 kernel: raid6: int64x8 gen() 6270 MB/s Apr 12 18:34:51.797237 kernel: raid6: int64x8 xor() 3540 MB/s Apr 12 18:34:51.818228 kernel: raid6: int64x4 gen() 7208 MB/s Apr 12 18:34:51.838226 kernel: raid6: int64x4 xor() 3857 MB/s Apr 12 18:34:51.858225 kernel: raid6: int64x2 gen() 6156 MB/s Apr 12 18:34:51.879226 kernel: raid6: int64x2 xor() 3322 MB/s Apr 12 18:34:51.899225 kernel: raid6: int64x1 gen() 5049 MB/s Apr 12 18:34:51.923642 kernel: raid6: int64x1 xor() 2647 MB/s Apr 12 18:34:51.923653 kernel: raid6: using algorithm neonx8 gen() 13828 MB/s Apr 12 18:34:51.923663 kernel: raid6: .... xor() 10833 MB/s, rmw enabled Apr 12 18:34:51.928718 kernel: raid6: using neon recovery algorithm Apr 12 18:34:51.946228 kernel: xor: measuring software checksum speed Apr 12 18:34:51.946242 kernel: 8regs : 17319 MB/sec Apr 12 18:34:51.954226 kernel: 32regs : 20770 MB/sec Apr 12 18:34:51.954235 kernel: arm64_neon : 27939 MB/sec Apr 12 18:34:51.962221 kernel: xor: using function: arm64_neon (27939 MB/sec) Apr 12 18:34:52.018235 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:34:52.027084 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:34:52.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:52.035000 audit: BPF prog-id=7 op=LOAD Apr 12 18:34:52.035000 audit: BPF prog-id=8 op=LOAD Apr 12 18:34:52.036553 systemd[1]: Starting systemd-udevd.service... Apr 12 18:34:52.050986 systemd-udevd[434]: Using default interface naming scheme 'v252'. Apr 12 18:34:52.056164 systemd[1]: Started systemd-udevd.service. Apr 12 18:34:52.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:52.066863 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:34:52.086042 dracut-pre-trigger[455]: rd.md=0: removing MD RAID activation Apr 12 18:34:52.116152 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:34:52.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:52.121499 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:34:52.162472 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:34:52.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:52.208244 kernel: hv_vmbus: Vmbus version:5.3 Apr 12 18:34:52.225237 kernel: hv_vmbus: registering driver hid_hyperv Apr 12 18:34:52.225281 kernel: hv_vmbus: registering driver hv_netvsc Apr 12 18:34:52.225291 kernel: hv_vmbus: registering driver hyperv_keyboard Apr 12 18:34:52.233232 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Apr 12 18:34:52.247782 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Apr 12 18:34:52.247836 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Apr 12 18:34:52.266411 kernel: hv_vmbus: registering driver hv_storvsc Apr 12 18:34:52.273947 kernel: scsi host1: storvsc_host_t Apr 12 18:34:52.274149 kernel: scsi host0: storvsc_host_t Apr 12 18:34:52.288386 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Apr 12 18:34:52.288466 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Apr 12 18:34:52.306955 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Apr 12 18:34:52.307169 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:34:52.307178 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Apr 12 18:34:52.316705 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 18:34:52.316862 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 18:34:52.327205 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Apr 12 18:34:52.327388 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Apr 12 18:34:52.329235 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Apr 12 18:34:52.329377 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:34:52.338248 kernel: hv_netvsc 000d3a06-ad26-000d-3a06-ad26000d3a06 eth0: VF slot 1 added Apr 12 18:34:52.338399 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 18:34:52.358859 kernel: hv_vmbus: registering driver hv_pci Apr 12 18:34:52.358911 kernel: hv_pci 01442cd4-8965-45b3-81b3-a94cec584482: PCI VMBus probing: Using version 0x10004 Apr 12 18:34:52.376555 kernel: hv_pci 01442cd4-8965-45b3-81b3-a94cec584482: PCI host bridge to bus 8965:00 Apr 12 18:34:52.376772 kernel: pci_bus 8965:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Apr 12 18:34:52.376875 kernel: pci_bus 8965:00: No busn resource found for root bus, will use [bus 00-ff] Apr 12 18:34:52.389281 kernel: pci 8965:00:02.0: [15b3:1018] type 00 class 0x020000 Apr 12 18:34:52.403227 kernel: pci 8965:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:34:52.423299 kernel: pci 8965:00:02.0: enabling Extended Tags Apr 12 18:34:52.441244 kernel: pci 8965:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 8965:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Apr 12 18:34:52.453266 kernel: pci_bus 8965:00: busn_res: [bus 00-ff] end is updated to 00 Apr 12 18:34:52.453430 kernel: pci 8965:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:34:52.495238 kernel: mlx5_core 8965:00:02.0: firmware version: 16.30.1284 Apr 12 18:34:52.661277 kernel: mlx5_core 8965:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Apr 12 18:34:52.721224 kernel: hv_netvsc 000d3a06-ad26-000d-3a06-ad26000d3a06 eth0: VF registering: eth1 Apr 12 18:34:52.721415 kernel: mlx5_core 8965:00:02.0 eth1: joined to eth0 Apr 12 18:34:52.733239 kernel: mlx5_core 8965:00:02.0 enP35173s1: renamed from eth1 Apr 12 18:34:52.894605 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:34:52.931242 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (491) Apr 12 18:34:52.944146 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:34:53.188809 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:34:54.349280 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:34:54.355200 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:34:54.368974 systemd[1]: Starting disk-uuid.service... Apr 12 18:34:54.392277 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:34:55.410281 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:34:55.410337 disk-uuid[563]: The operation has completed successfully. Apr 12 18:34:55.471259 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:34:55.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.471351 systemd[1]: Finished disk-uuid.service. Apr 12 18:34:55.521714 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:34:55.521736 kernel: audit: type=1130 audit(1712946895.475:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.521747 kernel: audit: type=1131 audit(1712946895.475:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.476297 systemd[1]: Starting verity-setup.service... Apr 12 18:34:55.563242 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:34:55.876958 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:34:55.882951 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:34:55.894890 systemd[1]: Finished verity-setup.service. Apr 12 18:34:55.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.919330 kernel: audit: type=1130 audit(1712946895.898:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:55.965237 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:34:55.965305 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:34:55.972783 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:34:55.973558 systemd[1]: Starting ignition-setup.service... Apr 12 18:34:55.985243 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:34:56.016023 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:34:56.016074 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:34:56.020694 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:34:56.058633 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:34:56.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.085903 systemd[1]: Starting systemd-networkd.service... Apr 12 18:34:56.110036 kernel: audit: type=1130 audit(1712946896.063:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.110062 kernel: audit: type=1334 audit(1712946896.085:22): prog-id=9 op=LOAD Apr 12 18:34:56.085000 audit: BPF prog-id=9 op=LOAD Apr 12 18:34:56.116991 systemd-networkd[827]: lo: Link UP Apr 12 18:34:56.117002 systemd-networkd[827]: lo: Gained carrier Apr 12 18:34:56.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.117427 systemd-networkd[827]: Enumeration completed Apr 12 18:34:56.155274 kernel: audit: type=1130 audit(1712946896.126:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.117506 systemd[1]: Started systemd-networkd.service. Apr 12 18:34:56.125646 systemd-networkd[827]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:34:56.146385 systemd[1]: Reached target network.target. Apr 12 18:34:56.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.154636 systemd[1]: Starting iscsiuio.service... Apr 12 18:34:56.202309 kernel: audit: type=1130 audit(1712946896.173:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.163479 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:34:56.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.163867 systemd[1]: Started iscsiuio.service. Apr 12 18:34:56.232833 kernel: audit: type=1130 audit(1712946896.204:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.232869 iscsid[839]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:34:56.232869 iscsid[839]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:34:56.232869 iscsid[839]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:34:56.232869 iscsid[839]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:34:56.232869 iscsid[839]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:34:56.232869 iscsid[839]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:34:56.232869 iscsid[839]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:34:56.334667 kernel: audit: type=1130 audit(1712946896.237:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.193235 systemd[1]: Starting iscsid.service... Apr 12 18:34:56.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.200711 systemd[1]: Started iscsid.service. Apr 12 18:34:56.205615 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:34:56.367476 kernel: audit: type=1130 audit(1712946896.339:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.229671 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:34:56.237382 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:34:56.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:56.265293 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:34:56.287387 systemd[1]: Reached target remote-fs.target. Apr 12 18:34:56.305195 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:34:56.329984 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:34:56.370996 systemd[1]: Finished ignition-setup.service. Apr 12 18:34:56.379960 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:34:56.437232 kernel: mlx5_core 8965:00:02.0 enP35173s1: Link up Apr 12 18:34:56.477237 kernel: hv_netvsc 000d3a06-ad26-000d-3a06-ad26000d3a06 eth0: Data path switched to VF: enP35173s1 Apr 12 18:34:56.482486 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:56.482716 systemd-networkd[827]: enP35173s1: Link UP Apr 12 18:34:56.483348 systemd-networkd[827]: eth0: Link UP Apr 12 18:34:56.483471 systemd-networkd[827]: eth0: Gained carrier Apr 12 18:34:56.494630 systemd-networkd[827]: enP35173s1: Gained carrier Apr 12 18:34:56.509301 systemd-networkd[827]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:34:57.570510 systemd-networkd[827]: eth0: Gained IPv6LL Apr 12 18:35:02.626532 ignition[854]: Ignition 2.14.0 Apr 12 18:35:02.626544 ignition[854]: Stage: fetch-offline Apr 12 18:35:02.626596 ignition[854]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:02.626620 ignition[854]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:02.725536 ignition[854]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:02.733522 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:35:02.774707 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:35:02.774732 kernel: audit: type=1130 audit(1712946902.739:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.725838 ignition[854]: parsed url from cmdline: "" Apr 12 18:35:02.740571 systemd[1]: Starting ignition-fetch.service... Apr 12 18:35:02.725842 ignition[854]: no config URL provided Apr 12 18:35:02.725848 ignition[854]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:35:02.725860 ignition[854]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:35:02.725866 ignition[854]: failed to fetch config: resource requires networking Apr 12 18:35:02.726161 ignition[854]: Ignition finished successfully Apr 12 18:35:02.763584 ignition[860]: Ignition 2.14.0 Apr 12 18:35:02.763592 ignition[860]: Stage: fetch Apr 12 18:35:02.763706 ignition[860]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:02.763724 ignition[860]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:02.766493 ignition[860]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:02.766646 ignition[860]: parsed url from cmdline: "" Apr 12 18:35:02.766650 ignition[860]: no config URL provided Apr 12 18:35:02.766654 ignition[860]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:35:02.826362 unknown[860]: fetched base config from "system" Apr 12 18:35:02.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.766662 ignition[860]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:35:02.862757 kernel: audit: type=1130 audit(1712946902.836:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.826370 unknown[860]: fetched base config from "system" Apr 12 18:35:02.766691 ignition[860]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Apr 12 18:35:02.826375 unknown[860]: fetched user config from "azure" Apr 12 18:35:02.789927 ignition[860]: GET result: OK Apr 12 18:35:02.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.828107 systemd[1]: Finished ignition-fetch.service. Apr 12 18:35:02.790016 ignition[860]: config has been read from IMDS userdata Apr 12 18:35:02.934296 kernel: audit: type=1130 audit(1712946902.890:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.934318 kernel: audit: type=1130 audit(1712946902.933:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:02.837823 systemd[1]: Starting ignition-kargs.service... Apr 12 18:35:02.790049 ignition[860]: parsing config with SHA512: 8b9957d4d686de35bd32585b49fa38ebcb55129b7789d8d7f28375ec8531df707bfe24e48e63a345c14d65be0ce4de77babdac967e4fc396d89225d723c44943 Apr 12 18:35:02.886592 systemd[1]: Finished ignition-kargs.service. Apr 12 18:35:02.826856 ignition[860]: fetch: fetch complete Apr 12 18:35:02.916524 systemd[1]: Starting ignition-disks.service... Apr 12 18:35:02.826861 ignition[860]: fetch: fetch passed Apr 12 18:35:02.929869 systemd[1]: Finished ignition-disks.service. Apr 12 18:35:02.826923 ignition[860]: Ignition finished successfully Apr 12 18:35:02.934225 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:35:02.874071 ignition[866]: Ignition 2.14.0 Apr 12 18:35:02.955905 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:35:02.874078 ignition[866]: Stage: kargs Apr 12 18:35:02.964135 systemd[1]: Reached target local-fs.target. Apr 12 18:35:02.874187 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:02.972509 systemd[1]: Reached target sysinit.target. Apr 12 18:35:02.874227 ignition[866]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:02.979857 systemd[1]: Reached target basic.target. Apr 12 18:35:02.877095 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:02.991418 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:35:02.882402 ignition[866]: kargs: kargs passed Apr 12 18:35:02.882455 ignition[866]: Ignition finished successfully Apr 12 18:35:02.923353 ignition[872]: Ignition 2.14.0 Apr 12 18:35:02.923360 ignition[872]: Stage: disks Apr 12 18:35:02.923461 ignition[872]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:02.923481 ignition[872]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:02.926182 ignition[872]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:02.928131 ignition[872]: disks: disks passed Apr 12 18:35:02.928187 ignition[872]: Ignition finished successfully Apr 12 18:35:03.104988 systemd-fsck[880]: ROOT: clean, 612/7326000 files, 481074/7359488 blocks Apr 12 18:35:03.114742 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:35:03.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:03.143936 kernel: audit: type=1130 audit(1712946903.119:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:03.140792 systemd[1]: Mounting sysroot.mount... Apr 12 18:35:03.161023 systemd[1]: Mounted sysroot.mount. Apr 12 18:35:03.164837 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:35:03.168671 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:35:03.212898 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:35:03.217474 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 18:35:03.226735 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:35:03.226777 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:35:03.237234 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:35:03.765339 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:35:03.770204 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:35:03.795242 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (891) Apr 12 18:35:03.807943 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:35:03.807983 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:35:03.808013 initrd-setup-root[896]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:35:03.820149 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:35:03.824061 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:35:03.837754 initrd-setup-root[922]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:35:03.964025 initrd-setup-root[930]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:35:03.972019 initrd-setup-root[938]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:35:05.055929 coreos-metadata[890]: Apr 12 18:35:05.055 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:35:05.067152 coreos-metadata[890]: Apr 12 18:35:05.067 INFO Fetch successful Apr 12 18:35:05.105540 coreos-metadata[890]: Apr 12 18:35:05.105 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:35:05.118427 coreos-metadata[890]: Apr 12 18:35:05.118 INFO Fetch successful Apr 12 18:35:05.146614 coreos-metadata[890]: Apr 12 18:35:05.146 INFO wrote hostname ci-3510.3.3-a-d058ff16f4 to /sysroot/etc/hostname Apr 12 18:35:05.148673 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 18:35:05.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.182245 kernel: audit: type=1130 audit(1712946905.159:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.365820 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:35:05.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.371152 systemd[1]: Starting ignition-mount.service... Apr 12 18:35:05.398410 kernel: audit: type=1130 audit(1712946905.370:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.402087 systemd[1]: Starting sysroot-boot.service... Apr 12 18:35:05.406966 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:35:05.407065 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:35:05.437078 ignition[960]: INFO : Ignition 2.14.0 Apr 12 18:35:05.441305 ignition[960]: INFO : Stage: mount Apr 12 18:35:05.441305 ignition[960]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:05.441305 ignition[960]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:05.486081 kernel: audit: type=1130 audit(1712946905.455:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.486148 ignition[960]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:05.486148 ignition[960]: INFO : mount: mount passed Apr 12 18:35:05.486148 ignition[960]: INFO : Ignition finished successfully Apr 12 18:35:05.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.451451 systemd[1]: Finished ignition-mount.service. Apr 12 18:35:05.486068 systemd[1]: Starting ignition-files.service... Apr 12 18:35:05.535278 kernel: audit: type=1130 audit(1712946905.504:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:05.498436 systemd[1]: Finished sysroot-boot.service. Apr 12 18:35:05.530349 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:35:05.557408 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (969) Apr 12 18:35:05.569594 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:35:05.569619 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:35:05.569630 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:35:05.580745 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:35:05.594501 ignition[988]: INFO : Ignition 2.14.0 Apr 12 18:35:05.594501 ignition[988]: INFO : Stage: files Apr 12 18:35:05.605535 ignition[988]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:05.605535 ignition[988]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:05.605535 ignition[988]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:05.605535 ignition[988]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:35:05.605535 ignition[988]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:35:05.605535 ignition[988]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:35:06.218282 ignition[988]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:35:06.225986 ignition[988]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:35:06.225986 ignition[988]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:35:06.225884 unknown[988]: wrote ssh authorized keys file for user: core Apr 12 18:35:06.245696 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:35:06.245696 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:35:06.692066 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:35:06.979116 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:35:06.995494 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:35:06.995494 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:35:06.995494 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:35:07.338823 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:35:07.477097 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:35:07.493449 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:35:07.493449 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:35:07.493449 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:35:07.731875 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:35:08.057146 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Apr 12 18:35:08.073932 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:35:08.073932 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:35:08.073932 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:35:08.124733 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:35:08.754877 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Apr 12 18:35:08.771161 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:35:08.771161 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:35:08.771161 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:35:08.771161 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:35:08.771161 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:35:08.824394 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:35:08.824394 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:35:08.824394 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:35:08.824394 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:35:08.879511 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (990) Apr 12 18:35:08.855559 systemd[1]: mnt-oem2905431482.mount: Deactivated successfully. Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2905431482" Apr 12 18:35:08.885572 ignition[988]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2905431482": device or resource busy Apr 12 18:35:08.885572 ignition[988]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2905431482", trying btrfs: device or resource busy Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2905431482" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2905431482" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2905431482" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2905431482" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194205944" Apr 12 18:35:08.885572 ignition[988]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194205944": device or resource busy Apr 12 18:35:08.885572 ignition[988]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4194205944", trying btrfs: device or resource busy Apr 12 18:35:08.885572 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194205944" Apr 12 18:35:09.108477 kernel: audit: type=1130 audit(1712946908.902:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.108507 kernel: audit: type=1130 audit(1712946908.991:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.108523 kernel: audit: type=1131 audit(1712946908.991:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.108624 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194205944" Apr 12 18:35:09.108624 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem4194205944" Apr 12 18:35:09.108624 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem4194205944" Apr 12 18:35:09.108624 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(12): [started] processing unit "waagent.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(12): [finished] processing unit "waagent.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(13): [started] processing unit "nvidia.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(13): [finished] processing unit "nvidia.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:35:09.108624 ignition[988]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:35:09.393190 kernel: audit: type=1130 audit(1712946909.179:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.393229 kernel: audit: type=1130 audit(1712946909.275:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.393240 kernel: audit: type=1131 audit(1712946909.275:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.393249 kernel: audit: type=1130 audit(1712946909.369:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.887756 systemd[1]: Finished ignition-files.service. Apr 12 18:35:09.400336 ignition[988]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:35:09.400336 ignition[988]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:35:09.400336 ignition[988]: INFO : files: op(1b): [started] setting preset to enabled for "waagent.service" Apr 12 18:35:09.400336 ignition[988]: INFO : files: op(1b): [finished] setting preset to enabled for "waagent.service" Apr 12 18:35:09.400336 ignition[988]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:35:09.400336 ignition[988]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:35:09.400336 ignition[988]: INFO : files: files passed Apr 12 18:35:09.400336 ignition[988]: INFO : Ignition finished successfully Apr 12 18:35:09.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.932396 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:35:09.504191 initrd-setup-root-after-ignition[1013]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:35:09.516473 kernel: audit: type=1131 audit(1712946909.470:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:08.950880 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:35:08.961782 systemd[1]: Starting ignition-quench.service... Apr 12 18:35:08.978209 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:35:08.978322 systemd[1]: Finished ignition-quench.service. Apr 12 18:35:09.168371 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:35:09.206549 systemd[1]: Reached target ignition-complete.target. Apr 12 18:35:09.236730 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:35:09.270600 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:35:09.270690 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:35:09.275530 systemd[1]: Reached target initrd-fs.target. Apr 12 18:35:09.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.313910 systemd[1]: Reached target initrd.target. Apr 12 18:35:09.318352 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:35:09.319161 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:35:09.664813 kernel: audit: type=1131 audit(1712946909.607:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.664840 kernel: audit: type=1131 audit(1712946909.646:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.360770 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:35:09.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.399780 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:35:09.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.419865 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:35:09.432098 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:35:09.703755 iscsid[839]: iscsid shutting down. Apr 12 18:35:09.443812 systemd[1]: Stopped target timers.target. Apr 12 18:35:09.714886 ignition[1026]: INFO : Ignition 2.14.0 Apr 12 18:35:09.714886 ignition[1026]: INFO : Stage: umount Apr 12 18:35:09.714886 ignition[1026]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:35:09.714886 ignition[1026]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:35:09.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.456986 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:35:09.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.785264 ignition[1026]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:35:09.785264 ignition[1026]: INFO : umount: umount passed Apr 12 18:35:09.785264 ignition[1026]: INFO : Ignition finished successfully Apr 12 18:35:09.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.457052 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:35:09.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.490965 systemd[1]: Stopped target initrd.target. Apr 12 18:35:09.499308 systemd[1]: Stopped target basic.target. Apr 12 18:35:09.508094 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:35:09.521197 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:35:09.535957 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:35:09.544709 systemd[1]: Stopped target remote-fs.target. Apr 12 18:35:09.553697 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:35:09.562834 systemd[1]: Stopped target sysinit.target. Apr 12 18:35:09.571802 systemd[1]: Stopped target local-fs.target. Apr 12 18:35:09.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.580456 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:35:09.589018 systemd[1]: Stopped target swap.target. Apr 12 18:35:09.598154 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:35:09.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.598231 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:35:09.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.627922 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:35:09.635971 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:35:09.636026 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:35:09.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.666450 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:35:09.666519 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:35:09.672143 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:35:09.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.672182 systemd[1]: Stopped ignition-files.service. Apr 12 18:35:09.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.684530 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 18:35:09.985000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:35:09.684573 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 18:35:09.694725 systemd[1]: Stopping ignition-mount.service... Apr 12 18:35:09.704719 systemd[1]: Stopping iscsid.service... Apr 12 18:35:10.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.710322 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:35:10.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.710386 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:35:10.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.719785 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:35:09.723346 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:35:10.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.723442 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:35:09.733031 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:35:10.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.733084 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:35:10.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.738097 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:35:10.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.738197 systemd[1]: Stopped iscsid.service. Apr 12 18:35:10.106807 kernel: hv_netvsc 000d3a06-ad26-000d-3a06-ad26000d3a06 eth0: Data path switched from VF: enP35173s1 Apr 12 18:35:10.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.753134 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:35:09.753228 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:35:10.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:10.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.769908 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:35:09.769990 systemd[1]: Stopped ignition-mount.service. Apr 12 18:35:09.774543 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:35:09.774586 systemd[1]: Stopped ignition-disks.service. Apr 12 18:35:09.785043 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:35:09.785089 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:35:09.789732 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:35:09.789768 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:35:09.805021 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:35:09.805066 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:35:09.814875 systemd[1]: Stopped target paths.target. Apr 12 18:35:09.822748 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:35:09.830796 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:35:09.845129 systemd[1]: Stopped target slices.target. Apr 12 18:35:09.855376 systemd[1]: Stopped target sockets.target. Apr 12 18:35:09.863553 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:35:09.863604 systemd[1]: Closed iscsid.socket. Apr 12 18:35:09.871314 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:35:09.871363 systemd[1]: Stopped ignition-setup.service. Apr 12 18:35:09.879525 systemd[1]: Stopping iscsiuio.service... Apr 12 18:35:09.892523 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:35:09.893076 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:35:10.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:09.893175 systemd[1]: Stopped iscsiuio.service. Apr 12 18:35:09.899681 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:35:09.899763 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:35:09.908792 systemd[1]: Stopped target network.target. Apr 12 18:35:09.916666 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:35:09.916706 systemd[1]: Closed iscsiuio.socket. Apr 12 18:35:09.924267 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:35:09.924309 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:35:09.933718 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:35:09.941597 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:35:09.947212 systemd-networkd[827]: eth0: DHCPv6 lease lost Apr 12 18:35:10.293000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:35:09.952208 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:35:09.952339 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:35:09.962959 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:35:09.963053 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:35:09.972372 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:35:09.972414 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:35:09.980460 systemd[1]: Stopping network-cleanup.service... Apr 12 18:35:09.993559 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:35:09.993626 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:35:10.002317 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:35:10.002367 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:35:10.015184 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:35:10.015294 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:35:10.020287 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:35:10.030139 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:35:10.030681 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:35:10.030811 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:35:10.038088 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:35:10.038131 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:35:10.048263 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:35:10.048299 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:35:10.052770 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:35:10.294241 systemd-journald[236]: Received SIGTERM from PID 1 (n/a). Apr 12 18:35:10.052826 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:35:10.061144 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:35:10.061192 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:35:10.070719 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:35:10.070774 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:35:10.080698 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:35:10.089284 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:35:10.089343 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:35:10.112545 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:35:10.112675 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:35:10.216528 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:35:10.216629 systemd[1]: Stopped network-cleanup.service. Apr 12 18:35:10.225585 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:35:10.235369 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:35:10.252987 systemd[1]: Switching root. Apr 12 18:35:10.294639 systemd-journald[236]: Journal stopped Apr 12 18:35:44.926864 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:35:44.926896 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:35:44.926907 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:35:44.926918 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:35:44.926926 kernel: SELinux: policy capability open_perms=1 Apr 12 18:35:44.926934 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:35:44.926944 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:35:44.926952 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:35:44.926960 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:35:44.926968 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:35:44.926977 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:35:44.926985 kernel: kauditd_printk_skb: 33 callbacks suppressed Apr 12 18:35:44.926994 kernel: audit: type=1403 audit(1712946914.435:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:35:44.927004 systemd[1]: Successfully loaded SELinux policy in 356.843ms. Apr 12 18:35:44.927015 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.313ms. Apr 12 18:35:44.927027 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:35:44.927036 systemd[1]: Detected virtualization microsoft. Apr 12 18:35:44.927045 systemd[1]: Detected architecture arm64. Apr 12 18:35:44.927054 systemd[1]: Detected first boot. Apr 12 18:35:44.927063 systemd[1]: Hostname set to . Apr 12 18:35:44.927072 systemd[1]: Initializing machine ID from random generator. Apr 12 18:35:44.927083 kernel: audit: type=1400 audit(1712946916.650:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:35:44.927095 kernel: audit: type=1400 audit(1712946916.650:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:35:44.927103 kernel: audit: type=1334 audit(1712946916.667:84): prog-id=10 op=LOAD Apr 12 18:35:44.927112 kernel: audit: type=1334 audit(1712946916.667:85): prog-id=10 op=UNLOAD Apr 12 18:35:44.927121 kernel: audit: type=1334 audit(1712946916.683:86): prog-id=11 op=LOAD Apr 12 18:35:44.927130 kernel: audit: type=1334 audit(1712946916.683:87): prog-id=11 op=UNLOAD Apr 12 18:35:44.927139 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:35:44.927148 kernel: audit: type=1400 audit(1712946918.069:88): avc: denied { associate } for pid=1059 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:35:44.927159 kernel: audit: type=1300 audit(1712946918.069:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227ec a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1042 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:44.927168 kernel: audit: type=1327 audit(1712946918.069:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:35:44.927178 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:35:44.927187 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:35:44.927196 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:35:44.927207 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:35:44.927225 kernel: kauditd_printk_skb: 6 callbacks suppressed Apr 12 18:35:44.927234 kernel: audit: type=1334 audit(1712946943.966:90): prog-id=12 op=LOAD Apr 12 18:35:44.927242 kernel: audit: type=1334 audit(1712946943.966:91): prog-id=3 op=UNLOAD Apr 12 18:35:44.927251 kernel: audit: type=1334 audit(1712946943.972:92): prog-id=13 op=LOAD Apr 12 18:35:44.927259 kernel: audit: type=1334 audit(1712946943.977:93): prog-id=14 op=LOAD Apr 12 18:35:44.927270 kernel: audit: type=1334 audit(1712946943.977:94): prog-id=4 op=UNLOAD Apr 12 18:35:44.927279 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:35:44.927289 kernel: audit: type=1334 audit(1712946943.977:95): prog-id=5 op=UNLOAD Apr 12 18:35:44.927298 kernel: audit: type=1334 audit(1712946943.983:96): prog-id=15 op=LOAD Apr 12 18:35:44.927308 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:35:44.927318 kernel: audit: type=1334 audit(1712946943.983:97): prog-id=12 op=UNLOAD Apr 12 18:35:44.927327 kernel: audit: type=1334 audit(1712946943.988:98): prog-id=16 op=LOAD Apr 12 18:35:44.927336 kernel: audit: type=1334 audit(1712946943.994:99): prog-id=17 op=LOAD Apr 12 18:35:44.927345 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:35:44.927354 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:35:44.927364 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:35:44.927375 systemd[1]: Created slice system-getty.slice. Apr 12 18:35:44.927384 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:35:44.927394 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:35:44.927403 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:35:44.927413 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:35:44.927422 systemd[1]: Created slice user.slice. Apr 12 18:35:44.927431 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:35:44.927440 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:35:44.927449 systemd[1]: Set up automount boot.automount. Apr 12 18:35:44.927460 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:35:44.927469 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:35:44.927478 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:35:44.927489 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:35:44.927498 systemd[1]: Reached target integritysetup.target. Apr 12 18:35:44.927507 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:35:44.927517 systemd[1]: Reached target remote-fs.target. Apr 12 18:35:44.927528 systemd[1]: Reached target slices.target. Apr 12 18:35:44.927537 systemd[1]: Reached target swap.target. Apr 12 18:35:44.927547 systemd[1]: Reached target torcx.target. Apr 12 18:35:44.927556 systemd[1]: Reached target veritysetup.target. Apr 12 18:35:44.927565 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:35:44.927575 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:35:44.927584 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:35:44.927595 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:35:44.927604 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:35:44.927613 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:35:44.927623 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:35:44.927632 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:35:44.927641 systemd[1]: Mounting media.mount... Apr 12 18:35:44.927651 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:35:44.927661 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:35:44.927671 systemd[1]: Mounting tmp.mount... Apr 12 18:35:44.927680 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:35:44.927690 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:35:44.927700 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:35:44.927709 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:35:44.927719 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:35:44.927728 systemd[1]: Starting modprobe@drm.service... Apr 12 18:35:44.927738 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:35:44.927748 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:35:44.927758 systemd[1]: Starting modprobe@loop.service... Apr 12 18:35:44.927768 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:35:44.927778 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:35:44.927787 kernel: fuse: init (API version 7.34) Apr 12 18:35:44.927796 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:35:44.927805 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:35:44.927814 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:35:44.927823 kernel: loop: module loaded Apr 12 18:35:44.927833 systemd[1]: Stopped systemd-journald.service. Apr 12 18:35:44.927843 systemd[1]: systemd-journald.service: Consumed 3.005s CPU time. Apr 12 18:35:44.927852 systemd[1]: Starting systemd-journald.service... Apr 12 18:35:44.927861 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:35:44.927871 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:35:44.927880 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:35:44.927890 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:35:44.927900 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:35:44.927909 systemd[1]: Stopped verity-setup.service. Apr 12 18:35:44.927920 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:35:44.927929 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:35:44.927942 systemd-journald[1163]: Journal started Apr 12 18:35:44.927981 systemd-journald[1163]: Runtime Journal (/run/log/journal/b4be04b15e344b4a8450fd9f2d0a2eee) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:35:14.435000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:35:16.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:35:16.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:35:16.667000 audit: BPF prog-id=10 op=LOAD Apr 12 18:35:16.667000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:35:16.683000 audit: BPF prog-id=11 op=LOAD Apr 12 18:35:16.683000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:35:18.069000 audit[1059]: AVC avc: denied { associate } for pid=1059 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:35:18.069000 audit[1059]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227ec a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1042 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:18.069000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:35:18.083000 audit[1059]: AVC avc: denied { associate } for pid=1059 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:35:18.083000 audit[1059]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228c9 a2=1ed a3=0 items=2 ppid=1042 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:18.083000 audit: CWD cwd="/" Apr 12 18:35:18.083000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:18.083000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:18.083000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:35:43.966000 audit: BPF prog-id=12 op=LOAD Apr 12 18:35:43.966000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:35:43.972000 audit: BPF prog-id=13 op=LOAD Apr 12 18:35:43.977000 audit: BPF prog-id=14 op=LOAD Apr 12 18:35:43.977000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:35:43.977000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:35:43.983000 audit: BPF prog-id=15 op=LOAD Apr 12 18:35:43.983000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:35:43.988000 audit: BPF prog-id=16 op=LOAD Apr 12 18:35:43.994000 audit: BPF prog-id=17 op=LOAD Apr 12 18:35:43.994000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:35:43.994000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:35:43.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.027000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:35:44.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.798000 audit: BPF prog-id=18 op=LOAD Apr 12 18:35:44.798000 audit: BPF prog-id=19 op=LOAD Apr 12 18:35:44.798000 audit: BPF prog-id=20 op=LOAD Apr 12 18:35:44.798000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:35:44.798000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:35:44.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.924000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:35:44.924000 audit[1163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffffb4612b0 a2=4000 a3=1 items=0 ppid=1 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:44.924000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:35:43.965573 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:35:17.975198 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:35:43.995321 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:35:18.023952 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:35:43.995682 systemd[1]: systemd-journald.service: Consumed 3.005s CPU time. Apr 12 18:35:18.023986 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:35:18.024025 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:35:18.024035 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:35:18.024261 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:35:18.024276 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:35:18.024568 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:35:18.024615 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:35:18.024627 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:35:18.054331 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:35:18.054413 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:35:18.054451 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:35:18.054465 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:35:18.054496 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:35:18.054509 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:35:42.249540 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:35:42.249792 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:35:42.249887 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:35:42.250042 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:35:42.250089 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:35:42.250143 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-04-12T18:35:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:35:44.941157 systemd[1]: Started systemd-journald.service. Apr 12 18:35:44.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.941875 systemd[1]: Mounted media.mount. Apr 12 18:35:44.945563 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:35:44.949922 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:35:44.954467 systemd[1]: Mounted tmp.mount. Apr 12 18:35:44.958266 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:35:44.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.963347 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:35:44.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.968181 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:35:44.968343 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:35:44.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.973255 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:35:44.973378 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:35:44.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.978534 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:35:44.978654 systemd[1]: Finished modprobe@drm.service. Apr 12 18:35:44.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.983411 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:35:44.983527 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:35:44.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.989472 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:35:44.989595 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:35:44.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.994327 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:35:44.994442 systemd[1]: Finished modprobe@loop.service. Apr 12 18:35:44.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:44.999123 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:35:45.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.005212 systemd[1]: Reached target network-pre.target. Apr 12 18:35:45.011582 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:35:45.017352 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:35:45.021642 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:35:45.022507 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:35:45.027720 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:35:45.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.032505 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:35:45.036840 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:35:45.055094 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:35:45.060276 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:35:45.064557 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:35:45.065556 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:35:45.070711 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:35:45.135971 systemd-journald[1163]: Time spent on flushing to /var/log/journal/b4be04b15e344b4a8450fd9f2d0a2eee is 13.760ms for 1113 entries. Apr 12 18:35:45.135971 systemd-journald[1163]: System Journal (/var/log/journal/b4be04b15e344b4a8450fd9f2d0a2eee) is 8.0M, max 2.6G, 2.6G free. Apr 12 18:35:45.218905 systemd-journald[1163]: Received client request to flush runtime journal. Apr 12 18:35:45.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.182760 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:35:45.188848 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:35:45.219818 udevadm[1177]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:35:45.219865 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:35:45.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.270140 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:35:45.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.275114 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:35:45.773519 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:35:45.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.779494 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:35:45.884433 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:35:45.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:45.950432 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:35:45.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:46.483009 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:35:46.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:46.488000 audit: BPF prog-id=21 op=LOAD Apr 12 18:35:46.488000 audit: BPF prog-id=22 op=LOAD Apr 12 18:35:46.488000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:35:46.488000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:35:46.489003 systemd[1]: Starting systemd-udevd.service... Apr 12 18:35:46.506386 systemd-udevd[1182]: Using default interface naming scheme 'v252'. Apr 12 18:35:46.833875 systemd[1]: Started systemd-udevd.service. Apr 12 18:35:46.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:46.843000 audit: BPF prog-id=23 op=LOAD Apr 12 18:35:46.846455 systemd[1]: Starting systemd-networkd.service... Apr 12 18:35:46.867645 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:35:46.939270 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:35:46.939000 audit: BPF prog-id=24 op=LOAD Apr 12 18:35:46.939000 audit: BPF prog-id=25 op=LOAD Apr 12 18:35:46.939000 audit: BPF prog-id=26 op=LOAD Apr 12 18:35:46.940517 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:35:46.957284 kernel: hv_vmbus: registering driver hyperv_fb Apr 12 18:35:46.968970 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Apr 12 18:35:46.969042 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Apr 12 18:35:46.976487 kernel: Console: switching to colour dummy device 80x25 Apr 12 18:35:46.979240 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:35:47.014798 kernel: hv_utils: Registering HyperV Utility Driver Apr 12 18:35:47.014896 kernel: hv_vmbus: registering driver hv_utils Apr 12 18:35:47.024890 kernel: hv_utils: Shutdown IC version 3.2 Apr 12 18:35:47.024954 kernel: hv_utils: Heartbeat IC version 3.0 Apr 12 18:35:47.024968 kernel: hv_utils: TimeSync IC version 4.0 Apr 12 18:35:47.011000 audit[1192]: AVC avc: denied { confidentiality } for pid=1192 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:35:47.466222 kernel: hv_vmbus: registering driver hv_balloon Apr 12 18:35:47.466302 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Apr 12 18:35:47.466319 kernel: hv_balloon: Memory hot add disabled on ARM64 Apr 12 18:35:47.460361 systemd[1]: Started systemd-userdbd.service. Apr 12 18:35:47.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:47.011000 audit[1192]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac531c440 a1=aa2c a2=ffff964e24b0 a3=aaaac527a010 items=12 ppid=1182 pid=1192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:47.011000 audit: CWD cwd="/" Apr 12 18:35:47.011000 audit: PATH item=0 name=(null) inode=5918 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=1 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=2 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=3 name=(null) inode=10720 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=4 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=5 name=(null) inode=10721 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=6 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=7 name=(null) inode=10722 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=8 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=9 name=(null) inode=10723 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=10 name=(null) inode=10719 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PATH item=11 name=(null) inode=10724 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:35:47.011000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:35:47.729925 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1194) Apr 12 18:35:47.747771 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:35:47.753566 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:35:47.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:47.759415 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:35:48.095611 lvm[1259]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:35:48.137770 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:35:48.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.142932 systemd[1]: Reached target cryptsetup.target. Apr 12 18:35:48.148534 systemd[1]: Starting lvm2-activation.service... Apr 12 18:35:48.152379 lvm[1260]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:35:48.171756 systemd[1]: Finished lvm2-activation.service. Apr 12 18:35:48.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.177064 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:35:48.181565 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:35:48.181589 systemd[1]: Reached target local-fs.target. Apr 12 18:35:48.185822 systemd[1]: Reached target machines.target. Apr 12 18:35:48.191007 systemd[1]: Starting ldconfig.service... Apr 12 18:35:48.266834 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:35:48.266955 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:35:48.268112 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:35:48.273339 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:35:48.279493 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:35:48.284029 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:35:48.284081 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:35:48.285035 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:35:48.333209 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1262 (bootctl) Apr 12 18:35:48.334385 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:35:48.360079 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:35:48.360632 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:35:48.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.378277 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:35:48.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.460087 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:35:48.568923 systemd-fsck[1270]: fsck.fat 4.2 (2021-01-31) Apr 12 18:35:48.568923 systemd-fsck[1270]: /dev/sda1: 236 files, 117047/258078 clusters Apr 12 18:35:48.570785 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:35:48.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.580735 systemd[1]: Mounting boot.mount... Apr 12 18:35:48.592207 systemd[1]: Mounted boot.mount. Apr 12 18:35:48.601550 systemd-networkd[1203]: lo: Link UP Apr 12 18:35:48.601788 systemd-networkd[1203]: lo: Gained carrier Apr 12 18:35:48.602377 systemd-networkd[1203]: Enumeration completed Apr 12 18:35:48.602646 systemd[1]: Started systemd-networkd.service. Apr 12 18:35:48.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.608253 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:35:48.613224 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:35:48.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:48.649033 systemd-networkd[1203]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:35:48.669342 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:35:48.695903 kernel: mlx5_core 8965:00:02.0 enP35173s1: Link up Apr 12 18:35:48.723915 kernel: hv_netvsc 000d3a06-ad26-000d-3a06-ad26000d3a06 eth0: Data path switched to VF: enP35173s1 Apr 12 18:35:48.724548 systemd-networkd[1203]: enP35173s1: Link UP Apr 12 18:35:48.724772 systemd-networkd[1203]: eth0: Link UP Apr 12 18:35:48.724835 systemd-networkd[1203]: eth0: Gained carrier Apr 12 18:35:48.729110 systemd-networkd[1203]: enP35173s1: Gained carrier Apr 12 18:35:48.738994 systemd-networkd[1203]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:35:48.781340 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:35:49.350142 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:35:49.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.356150 systemd[1]: Starting audit-rules.service... Apr 12 18:35:49.360718 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:35:49.366322 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:35:49.370000 audit: BPF prog-id=27 op=LOAD Apr 12 18:35:49.372500 systemd[1]: Starting systemd-resolved.service... Apr 12 18:35:49.378000 audit: BPF prog-id=28 op=LOAD Apr 12 18:35:49.380093 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:35:49.385356 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:35:49.442005 kernel: kauditd_printk_skb: 80 callbacks suppressed Apr 12 18:35:49.442106 kernel: audit: type=1130 audit(1712946949.420:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.416734 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:35:49.441660 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:35:49.465865 kernel: audit: type=1127 audit(1712946949.446:164): pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.446000 audit[1282]: SYSTEM_BOOT pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.467601 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:35:49.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.494925 kernel: audit: type=1130 audit(1712946949.471:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.494187 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:35:49.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.498692 systemd[1]: Reached target time-set.target. Apr 12 18:35:49.520593 kernel: audit: type=1130 audit(1712946949.497:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.619778 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:35:49.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.642987 kernel: audit: type=1130 audit(1712946949.624:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.642807 systemd-resolved[1280]: Positive Trust Anchors: Apr 12 18:35:49.642822 systemd-resolved[1280]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:35:49.642849 systemd-resolved[1280]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:35:49.646716 systemd-resolved[1280]: Using system hostname 'ci-3510.3.3-a-d058ff16f4'. Apr 12 18:35:49.648037 systemd[1]: Started systemd-resolved.service. Apr 12 18:35:49.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.652434 systemd[1]: Reached target network.target. Apr 12 18:35:49.673174 kernel: audit: type=1130 audit(1712946949.651:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.673562 systemd[1]: Reached target nss-lookup.target. Apr 12 18:35:49.786038 systemd-timesyncd[1281]: Contacted time server 5.78.89.3:123 (0.flatcar.pool.ntp.org). Apr 12 18:35:49.786096 systemd-timesyncd[1281]: Initial clock synchronization to Fri 2024-04-12 18:35:49.785774 UTC. Apr 12 18:35:49.901095 systemd-networkd[1203]: eth0: Gained IPv6LL Apr 12 18:35:49.902686 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:35:49.908196 systemd[1]: Reached target network-online.target. Apr 12 18:35:49.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.930988 kernel: audit: type=1130 audit(1712946949.907:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:35:49.963771 augenrules[1298]: No rules Apr 12 18:35:49.962000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:35:49.962000 audit[1298]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb876e00 a2=420 a3=0 items=0 ppid=1277 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:49.976059 systemd[1]: Finished audit-rules.service. Apr 12 18:35:50.005335 kernel: audit: type=1305 audit(1712946949.962:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:35:50.005427 kernel: audit: type=1300 audit(1712946949.962:170): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb876e00 a2=420 a3=0 items=0 ppid=1277 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:49.962000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:35:50.017852 kernel: audit: type=1327 audit(1712946949.962:170): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:35:59.706655 ldconfig[1261]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:35:59.717907 systemd[1]: Finished ldconfig.service. Apr 12 18:35:59.723653 systemd[1]: Starting systemd-update-done.service... Apr 12 18:35:59.763139 systemd[1]: Finished systemd-update-done.service. Apr 12 18:35:59.767842 systemd[1]: Reached target sysinit.target. Apr 12 18:35:59.772090 systemd[1]: Started motdgen.path. Apr 12 18:35:59.775645 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:35:59.781739 systemd[1]: Started logrotate.timer. Apr 12 18:35:59.785542 systemd[1]: Started mdadm.timer. Apr 12 18:35:59.789030 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:35:59.793508 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:35:59.793542 systemd[1]: Reached target paths.target. Apr 12 18:35:59.797584 systemd[1]: Reached target timers.target. Apr 12 18:35:59.802283 systemd[1]: Listening on dbus.socket. Apr 12 18:35:59.807067 systemd[1]: Starting docker.socket... Apr 12 18:35:59.827311 systemd[1]: Listening on sshd.socket. Apr 12 18:35:59.831247 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:35:59.831673 systemd[1]: Listening on docker.socket. Apr 12 18:35:59.835666 systemd[1]: Reached target sockets.target. Apr 12 18:35:59.839805 systemd[1]: Reached target basic.target. Apr 12 18:35:59.845905 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:35:59.845936 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:35:59.846856 systemd[1]: Starting containerd.service... Apr 12 18:35:59.851296 systemd[1]: Starting dbus.service... Apr 12 18:35:59.855274 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:35:59.860283 systemd[1]: Starting extend-filesystems.service... Apr 12 18:35:59.866843 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:35:59.867820 systemd[1]: Starting motdgen.service... Apr 12 18:35:59.872001 systemd[1]: Started nvidia.service. Apr 12 18:35:59.876883 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:35:59.881820 systemd[1]: Starting prepare-critools.service... Apr 12 18:35:59.886622 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:35:59.891643 systemd[1]: Starting sshd-keygen.service... Apr 12 18:35:59.897225 systemd[1]: Starting systemd-logind.service... Apr 12 18:35:59.901193 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:35:59.901244 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:35:59.901607 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:35:59.902195 systemd[1]: Starting update-engine.service... Apr 12 18:35:59.906734 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:35:59.915701 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:35:59.915862 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:35:59.933278 jq[1326]: true Apr 12 18:35:59.934335 jq[1308]: false Apr 12 18:35:59.949372 extend-filesystems[1309]: Found sda Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda1 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda2 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda3 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found usr Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda4 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda6 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda7 Apr 12 18:35:59.953468 extend-filesystems[1309]: Found sda9 Apr 12 18:35:59.953468 extend-filesystems[1309]: Checking size of /dev/sda9 Apr 12 18:35:59.958622 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:35:59.958797 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:35:59.998412 jq[1332]: true Apr 12 18:35:59.968081 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:35:59.968243 systemd[1]: Finished motdgen.service. Apr 12 18:36:00.022128 systemd-logind[1323]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Apr 12 18:36:00.022435 env[1334]: time="2024-04-12T18:36:00.022162041Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:36:00.022734 systemd-logind[1323]: New seat seat0. Apr 12 18:36:00.064491 env[1334]: time="2024-04-12T18:36:00.064435640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:36:00.064637 env[1334]: time="2024-04-12T18:36:00.064609799Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.066129 env[1334]: time="2024-04-12T18:36:00.066022591Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:36:00.066129 env[1334]: time="2024-04-12T18:36:00.066076111Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067104 env[1334]: time="2024-04-12T18:36:00.067071945Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067153 env[1334]: time="2024-04-12T18:36:00.067105025Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067153 env[1334]: time="2024-04-12T18:36:00.067120785Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:36:00.067153 env[1334]: time="2024-04-12T18:36:00.067130465Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067215 env[1334]: time="2024-04-12T18:36:00.067207745Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067438 env[1334]: time="2024-04-12T18:36:00.067412624Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067553 env[1334]: time="2024-04-12T18:36:00.067529463Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:36:00.067553 env[1334]: time="2024-04-12T18:36:00.067550383Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:36:00.067611 env[1334]: time="2024-04-12T18:36:00.067603062Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:36:00.067635 env[1334]: time="2024-04-12T18:36:00.067614542Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:36:00.077610 extend-filesystems[1309]: Old size kept for /dev/sda9 Apr 12 18:36:00.090720 extend-filesystems[1309]: Found sr0 Apr 12 18:36:00.083466 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:36:00.096970 tar[1328]: ./ Apr 12 18:36:00.096970 tar[1328]: ./loopback Apr 12 18:36:00.083622 systemd[1]: Finished extend-filesystems.service. Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100416156Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100458836Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100498956Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100535515Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100562475Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100577315Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100589915Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100967313Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.100984913Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.101008233Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.101023593Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.101038513Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.101173432Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:36:00.108260 env[1334]: time="2024-04-12T18:36:00.101256191Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:36:00.108537 tar[1329]: crictl Apr 12 18:36:00.103197 systemd[1]: Started containerd.service. Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101552670Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101595349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101617109Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101662749Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101675469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101688269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101700709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101712949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101725349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101736629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101748988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101763108Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101888668Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101926427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.110697 env[1334]: time="2024-04-12T18:36:00.101944507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.115599 env[1334]: time="2024-04-12T18:36:00.101956467Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:36:00.115599 env[1334]: time="2024-04-12T18:36:00.101972867Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:36:00.115599 env[1334]: time="2024-04-12T18:36:00.101983707Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:36:00.115599 env[1334]: time="2024-04-12T18:36:00.102000627Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:36:00.115599 env[1334]: time="2024-04-12T18:36:00.102034667Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.102227106Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.102278625Z" level=info msg="Connect containerd service" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.102312065Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.102803262Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.103047061Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.103088141Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.103134301Z" level=info msg="containerd successfully booted in 0.081605s" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.108140112Z" level=info msg="Start subscribing containerd event" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.115469551Z" level=info msg="Start recovering state" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.115560110Z" level=info msg="Start event monitor" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.115579350Z" level=info msg="Start snapshots syncer" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.115593150Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:36:00.115707 env[1334]: time="2024-04-12T18:36:00.115602190Z" level=info msg="Start streaming server" Apr 12 18:36:00.167253 tar[1328]: ./bandwidth Apr 12 18:36:00.177877 bash[1360]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:36:00.178713 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:36:00.244667 dbus-daemon[1307]: [system] SELinux support is enabled Apr 12 18:36:00.245978 systemd[1]: Started dbus.service. Apr 12 18:36:00.252731 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:36:00.252748 systemd[1]: Reached target system-config.target. Apr 12 18:36:00.263236 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:36:00.263258 systemd[1]: Reached target user-config.target. Apr 12 18:36:00.269565 systemd[1]: Started systemd-logind.service. Apr 12 18:36:00.278119 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:36:00.291915 tar[1328]: ./ptp Apr 12 18:36:00.356754 tar[1328]: ./vlan Apr 12 18:36:00.424219 tar[1328]: ./host-device Apr 12 18:36:00.485201 tar[1328]: ./tuning Apr 12 18:36:00.536505 tar[1328]: ./vrf Apr 12 18:36:00.583250 tar[1328]: ./sbr Apr 12 18:36:00.615170 systemd[1]: Finished prepare-critools.service. Apr 12 18:36:00.633274 tar[1328]: ./tap Apr 12 18:36:00.666850 tar[1328]: ./dhcp Apr 12 18:36:00.748370 tar[1328]: ./static Apr 12 18:36:00.772510 tar[1328]: ./firewall Apr 12 18:36:00.808583 tar[1328]: ./macvlan Apr 12 18:36:00.841745 tar[1328]: ./dummy Apr 12 18:36:00.874355 tar[1328]: ./bridge Apr 12 18:36:00.909819 tar[1328]: ./ipvlan Apr 12 18:36:00.942280 tar[1328]: ./portmap Apr 12 18:36:00.973216 tar[1328]: ./host-local Apr 12 18:36:01.047988 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:36:01.383040 update_engine[1325]: I0412 18:36:01.368443 1325 main.cc:92] Flatcar Update Engine starting Apr 12 18:36:01.440178 systemd[1]: Started update-engine.service. Apr 12 18:36:01.444335 update_engine[1325]: I0412 18:36:01.440196 1325 update_check_scheduler.cc:74] Next update check in 10m54s Apr 12 18:36:01.446671 systemd[1]: Started locksmithd.service. Apr 12 18:36:02.088500 sshd_keygen[1324]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:36:02.104830 systemd[1]: Finished sshd-keygen.service. Apr 12 18:36:02.110713 systemd[1]: Starting issuegen.service... Apr 12 18:36:02.115285 systemd[1]: Started waagent.service. Apr 12 18:36:02.119766 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:36:02.119944 systemd[1]: Finished issuegen.service. Apr 12 18:36:02.125348 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:36:02.153109 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:36:02.159356 systemd[1]: Started getty@tty1.service. Apr 12 18:36:02.164648 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:36:02.169427 systemd[1]: Reached target getty.target. Apr 12 18:36:02.173548 systemd[1]: Reached target multi-user.target. Apr 12 18:36:02.179077 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:36:02.190183 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:36:02.190335 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:36:02.195757 systemd[1]: Startup finished in 713ms (kernel) + 23.151s (initrd) + 47.980s (userspace) = 1min 11.845s. Apr 12 18:36:03.843182 locksmithd[1416]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:36:03.958499 login[1431]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 18:36:03.987986 login[1430]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:36:04.032027 systemd[1]: Created slice user-500.slice. Apr 12 18:36:04.033408 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:36:04.035857 systemd-logind[1323]: New session 1 of user core. Apr 12 18:36:04.080971 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:36:04.082661 systemd[1]: Starting user@500.service... Apr 12 18:36:04.118539 (systemd)[1440]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:36:04.340581 systemd[1440]: Queued start job for default target default.target. Apr 12 18:36:04.341112 systemd[1440]: Reached target paths.target. Apr 12 18:36:04.341132 systemd[1440]: Reached target sockets.target. Apr 12 18:36:04.341143 systemd[1440]: Reached target timers.target. Apr 12 18:36:04.341153 systemd[1440]: Reached target basic.target. Apr 12 18:36:04.341251 systemd[1]: Started user@500.service. Apr 12 18:36:04.342065 systemd[1]: Started session-1.scope. Apr 12 18:36:04.342421 systemd[1440]: Reached target default.target. Apr 12 18:36:04.342567 systemd[1440]: Startup finished in 217ms. Apr 12 18:36:04.959891 login[1431]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:36:04.964679 systemd[1]: Started session-2.scope. Apr 12 18:36:04.965165 systemd-logind[1323]: New session 2 of user core. Apr 12 18:36:09.718217 waagent[1428]: 2024-04-12T18:36:09.718101Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Apr 12 18:36:09.724888 waagent[1428]: 2024-04-12T18:36:09.724798Z INFO Daemon Daemon OS: flatcar 3510.3.3 Apr 12 18:36:09.729676 waagent[1428]: 2024-04-12T18:36:09.729600Z INFO Daemon Daemon Python: 3.9.16 Apr 12 18:36:09.734690 waagent[1428]: 2024-04-12T18:36:09.734533Z INFO Daemon Daemon Run daemon Apr 12 18:36:09.738958 waagent[1428]: 2024-04-12T18:36:09.738878Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.3' Apr 12 18:36:09.758446 waagent[1428]: 2024-04-12T18:36:09.758297Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:36:09.773241 waagent[1428]: 2024-04-12T18:36:09.773109Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:36:09.782795 waagent[1428]: 2024-04-12T18:36:09.782713Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:36:09.787800 waagent[1428]: 2024-04-12T18:36:09.787725Z INFO Daemon Daemon Using waagent for provisioning Apr 12 18:36:09.793568 waagent[1428]: 2024-04-12T18:36:09.793504Z INFO Daemon Daemon Activate resource disk Apr 12 18:36:09.798417 waagent[1428]: 2024-04-12T18:36:09.798358Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Apr 12 18:36:09.812621 waagent[1428]: 2024-04-12T18:36:09.812545Z INFO Daemon Daemon Found device: None Apr 12 18:36:09.817195 waagent[1428]: 2024-04-12T18:36:09.817134Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Apr 12 18:36:09.825582 waagent[1428]: 2024-04-12T18:36:09.825520Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Apr 12 18:36:09.838017 waagent[1428]: 2024-04-12T18:36:09.837942Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:36:09.845029 waagent[1428]: 2024-04-12T18:36:09.844964Z INFO Daemon Daemon Running default provisioning handler Apr 12 18:36:09.858730 waagent[1428]: 2024-04-12T18:36:09.858567Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:36:09.874637 waagent[1428]: 2024-04-12T18:36:09.874484Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:36:09.885090 waagent[1428]: 2024-04-12T18:36:09.884998Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:36:09.890540 waagent[1428]: 2024-04-12T18:36:09.890461Z INFO Daemon Daemon Copying ovf-env.xml Apr 12 18:36:10.020414 waagent[1428]: 2024-04-12T18:36:10.020162Z INFO Daemon Daemon Successfully mounted dvd Apr 12 18:36:10.172711 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Apr 12 18:36:10.232261 waagent[1428]: 2024-04-12T18:36:10.232110Z INFO Daemon Daemon Detect protocol endpoint Apr 12 18:36:10.242726 waagent[1428]: 2024-04-12T18:36:10.242631Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:36:10.249088 waagent[1428]: 2024-04-12T18:36:10.249002Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Apr 12 18:36:10.255770 waagent[1428]: 2024-04-12T18:36:10.255689Z INFO Daemon Daemon Test for route to 168.63.129.16 Apr 12 18:36:10.261304 waagent[1428]: 2024-04-12T18:36:10.261232Z INFO Daemon Daemon Route to 168.63.129.16 exists Apr 12 18:36:10.266622 waagent[1428]: 2024-04-12T18:36:10.266551Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Apr 12 18:36:10.396489 waagent[1428]: 2024-04-12T18:36:10.396424Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Apr 12 18:36:10.403747 waagent[1428]: 2024-04-12T18:36:10.403703Z INFO Daemon Daemon Wire protocol version:2012-11-30 Apr 12 18:36:10.409328 waagent[1428]: 2024-04-12T18:36:10.409270Z INFO Daemon Daemon Server preferred version:2015-04-05 Apr 12 18:36:10.789400 waagent[1428]: 2024-04-12T18:36:10.789206Z INFO Daemon Daemon Initializing goal state during protocol detection Apr 12 18:36:10.805396 waagent[1428]: 2024-04-12T18:36:10.805322Z INFO Daemon Daemon Forcing an update of the goal state.. Apr 12 18:36:10.811400 waagent[1428]: 2024-04-12T18:36:10.811333Z INFO Daemon Daemon Fetching goal state [incarnation 1] Apr 12 18:36:10.883227 waagent[1428]: 2024-04-12T18:36:10.883101Z INFO Daemon Daemon Found private key matching thumbprint 532466DA56DA1751DAF05C444C7E9B6037259BAC Apr 12 18:36:10.891418 waagent[1428]: 2024-04-12T18:36:10.891351Z INFO Daemon Daemon Certificate with thumbprint C9A897268D9F04FB4E30CE7592E14637A5ACE6C8 has no matching private key. Apr 12 18:36:10.900985 waagent[1428]: 2024-04-12T18:36:10.900890Z INFO Daemon Daemon Fetch goal state completed Apr 12 18:36:10.948749 waagent[1428]: 2024-04-12T18:36:10.948692Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 22b62dcd-38e3-4fb8-928b-1c3cc7986205 New eTag: 710113253916868696] Apr 12 18:36:10.959253 waagent[1428]: 2024-04-12T18:36:10.959177Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:36:10.974731 waagent[1428]: 2024-04-12T18:36:10.974675Z INFO Daemon Daemon Starting provisioning Apr 12 18:36:10.979739 waagent[1428]: 2024-04-12T18:36:10.979675Z INFO Daemon Daemon Handle ovf-env.xml. Apr 12 18:36:10.984539 waagent[1428]: 2024-04-12T18:36:10.984482Z INFO Daemon Daemon Set hostname [ci-3510.3.3-a-d058ff16f4] Apr 12 18:36:11.032455 waagent[1428]: 2024-04-12T18:36:11.032318Z INFO Daemon Daemon Publish hostname [ci-3510.3.3-a-d058ff16f4] Apr 12 18:36:11.038840 waagent[1428]: 2024-04-12T18:36:11.038757Z INFO Daemon Daemon Examine /proc/net/route for primary interface Apr 12 18:36:11.045464 waagent[1428]: 2024-04-12T18:36:11.045368Z INFO Daemon Daemon Primary interface is [eth0] Apr 12 18:36:11.061130 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Apr 12 18:36:11.061291 systemd[1]: Stopped systemd-networkd-wait-online.service. Apr 12 18:36:11.061346 systemd[1]: Stopping systemd-networkd-wait-online.service... Apr 12 18:36:11.061576 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:36:11.065943 systemd-networkd[1203]: eth0: DHCPv6 lease lost Apr 12 18:36:11.067752 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:36:11.067930 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:36:11.070027 systemd[1]: Starting systemd-networkd.service... Apr 12 18:36:11.096291 systemd-networkd[1486]: enP35173s1: Link UP Apr 12 18:36:11.096304 systemd-networkd[1486]: enP35173s1: Gained carrier Apr 12 18:36:11.097226 systemd-networkd[1486]: eth0: Link UP Apr 12 18:36:11.097234 systemd-networkd[1486]: eth0: Gained carrier Apr 12 18:36:11.097545 systemd-networkd[1486]: lo: Link UP Apr 12 18:36:11.097554 systemd-networkd[1486]: lo: Gained carrier Apr 12 18:36:11.097778 systemd-networkd[1486]: eth0: Gained IPv6LL Apr 12 18:36:11.099080 systemd-networkd[1486]: Enumeration completed Apr 12 18:36:11.099180 systemd[1]: Started systemd-networkd.service. Apr 12 18:36:11.101289 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:36:11.101289 systemd-networkd[1486]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:36:11.103836 waagent[1428]: 2024-04-12T18:36:11.103678Z INFO Daemon Daemon Create user account if not exists Apr 12 18:36:11.111928 waagent[1428]: 2024-04-12T18:36:11.111830Z INFO Daemon Daemon User core already exists, skip useradd Apr 12 18:36:11.117970 waagent[1428]: 2024-04-12T18:36:11.117878Z INFO Daemon Daemon Configure sudoer Apr 12 18:36:11.122950 waagent[1428]: 2024-04-12T18:36:11.122862Z INFO Daemon Daemon Configure sshd Apr 12 18:36:11.127198 waagent[1428]: 2024-04-12T18:36:11.127137Z INFO Daemon Daemon Deploy ssh public key. Apr 12 18:36:11.131961 systemd-networkd[1486]: eth0: DHCPv4 address 10.200.20.19/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:36:11.143250 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:36:12.361828 waagent[1428]: 2024-04-12T18:36:12.361762Z INFO Daemon Daemon Provisioning complete Apr 12 18:36:12.384450 waagent[1428]: 2024-04-12T18:36:12.384385Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Apr 12 18:36:12.391538 waagent[1428]: 2024-04-12T18:36:12.391459Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Apr 12 18:36:12.406258 waagent[1428]: 2024-04-12T18:36:12.406173Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Apr 12 18:36:12.705020 waagent[1495]: 2024-04-12T18:36:12.704928Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Apr 12 18:36:12.705763 waagent[1495]: 2024-04-12T18:36:12.705700Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:12.705889 waagent[1495]: 2024-04-12T18:36:12.705845Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:12.718181 waagent[1495]: 2024-04-12T18:36:12.718097Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Apr 12 18:36:12.718368 waagent[1495]: 2024-04-12T18:36:12.718319Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Apr 12 18:36:12.789496 waagent[1495]: 2024-04-12T18:36:12.789360Z INFO ExtHandler ExtHandler Found private key matching thumbprint 532466DA56DA1751DAF05C444C7E9B6037259BAC Apr 12 18:36:12.789706 waagent[1495]: 2024-04-12T18:36:12.789654Z INFO ExtHandler ExtHandler Certificate with thumbprint C9A897268D9F04FB4E30CE7592E14637A5ACE6C8 has no matching private key. Apr 12 18:36:12.789948 waagent[1495]: 2024-04-12T18:36:12.789873Z INFO ExtHandler ExtHandler Fetch goal state completed Apr 12 18:36:12.807703 waagent[1495]: 2024-04-12T18:36:12.807647Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 66d71581-d291-4c2a-bff4-b48ca3c03bf5 New eTag: 710113253916868696] Apr 12 18:36:12.808282 waagent[1495]: 2024-04-12T18:36:12.808220Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:36:12.906952 waagent[1495]: 2024-04-12T18:36:12.906791Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:36:12.917035 waagent[1495]: 2024-04-12T18:36:12.916957Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1495 Apr 12 18:36:12.920676 waagent[1495]: 2024-04-12T18:36:12.920614Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:36:12.921983 waagent[1495]: 2024-04-12T18:36:12.921927Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:36:13.074235 waagent[1495]: 2024-04-12T18:36:13.074116Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:36:13.074597 waagent[1495]: 2024-04-12T18:36:13.074537Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:36:13.082635 waagent[1495]: 2024-04-12T18:36:13.082569Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:36:13.083178 waagent[1495]: 2024-04-12T18:36:13.083124Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:36:13.084331 waagent[1495]: 2024-04-12T18:36:13.084268Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Apr 12 18:36:13.085680 waagent[1495]: 2024-04-12T18:36:13.085611Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:36:13.086335 waagent[1495]: 2024-04-12T18:36:13.086275Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:13.086578 waagent[1495]: 2024-04-12T18:36:13.086530Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:13.087255 waagent[1495]: 2024-04-12T18:36:13.087191Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:36:13.087879 waagent[1495]: 2024-04-12T18:36:13.087810Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:36:13.088353 waagent[1495]: 2024-04-12T18:36:13.088294Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:13.088503 waagent[1495]: 2024-04-12T18:36:13.088433Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:36:13.088503 waagent[1495]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:36:13.088503 waagent[1495]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:36:13.088503 waagent[1495]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:36:13.088503 waagent[1495]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:13.088503 waagent[1495]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:13.088503 waagent[1495]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:13.088676 waagent[1495]: 2024-04-12T18:36:13.088623Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:13.089799 waagent[1495]: 2024-04-12T18:36:13.089717Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:36:13.090936 waagent[1495]: 2024-04-12T18:36:13.089974Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:36:13.091850 waagent[1495]: 2024-04-12T18:36:13.091667Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:36:13.092868 waagent[1495]: 2024-04-12T18:36:13.092783Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:36:13.093017 waagent[1495]: 2024-04-12T18:36:13.092944Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:36:13.093378 waagent[1495]: 2024-04-12T18:36:13.093297Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:36:13.093635 waagent[1495]: 2024-04-12T18:36:13.093571Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:36:13.093759 waagent[1495]: 2024-04-12T18:36:13.093698Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:36:13.106246 waagent[1495]: 2024-04-12T18:36:13.106170Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Apr 12 18:36:13.107009 waagent[1495]: 2024-04-12T18:36:13.106936Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:36:13.108253 waagent[1495]: 2024-04-12T18:36:13.108180Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Apr 12 18:36:13.135109 waagent[1495]: 2024-04-12T18:36:13.134976Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1486' Apr 12 18:36:13.151359 waagent[1495]: 2024-04-12T18:36:13.151291Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Apr 12 18:36:13.219101 waagent[1495]: 2024-04-12T18:36:13.218980Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:36:13.219101 waagent[1495]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:36:13.219101 waagent[1495]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:36:13.219101 waagent[1495]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:ad:26 brd ff:ff:ff:ff:ff:ff Apr 12 18:36:13.219101 waagent[1495]: 3: enP35173s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:ad:26 brd ff:ff:ff:ff:ff:ff\ altname enP35173p0s2 Apr 12 18:36:13.219101 waagent[1495]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:36:13.219101 waagent[1495]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:36:13.219101 waagent[1495]: 2: eth0 inet 10.200.20.19/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:36:13.219101 waagent[1495]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:36:13.219101 waagent[1495]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:36:13.219101 waagent[1495]: 2: eth0 inet6 fe80::20d:3aff:fe06:ad26/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:36:13.352744 waagent[1495]: 2024-04-12T18:36:13.352640Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.8 -- exiting Apr 12 18:36:13.409173 waagent[1428]: 2024-04-12T18:36:13.409059Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Apr 12 18:36:13.412988 waagent[1428]: 2024-04-12T18:36:13.412938Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.8 to be the latest agent Apr 12 18:36:14.577911 waagent[1523]: 2024-04-12T18:36:14.577796Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.8) Apr 12 18:36:14.578886 waagent[1523]: 2024-04-12T18:36:14.578832Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.3 Apr 12 18:36:14.579139 waagent[1523]: 2024-04-12T18:36:14.579091Z INFO ExtHandler ExtHandler Python: 3.9.16 Apr 12 18:36:14.579342 waagent[1523]: 2024-04-12T18:36:14.579299Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Apr 12 18:36:14.587286 waagent[1523]: 2024-04-12T18:36:14.587193Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:36:14.587762 waagent[1523]: 2024-04-12T18:36:14.587711Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:14.588015 waagent[1523]: 2024-04-12T18:36:14.587966Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:14.600820 waagent[1523]: 2024-04-12T18:36:14.600751Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Apr 12 18:36:14.609436 waagent[1523]: 2024-04-12T18:36:14.609383Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.149 Apr 12 18:36:14.610547 waagent[1523]: 2024-04-12T18:36:14.610494Z INFO ExtHandler Apr 12 18:36:14.610791 waagent[1523]: 2024-04-12T18:36:14.610743Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 680fa280-698d-4aab-a405-adaa4059f6ff eTag: 710113253916868696 source: Fabric] Apr 12 18:36:14.611613 waagent[1523]: 2024-04-12T18:36:14.611561Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Apr 12 18:36:14.612920 waagent[1523]: 2024-04-12T18:36:14.612844Z INFO ExtHandler Apr 12 18:36:14.613145 waagent[1523]: 2024-04-12T18:36:14.613098Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Apr 12 18:36:14.619685 waagent[1523]: 2024-04-12T18:36:14.619641Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Apr 12 18:36:14.620221 waagent[1523]: 2024-04-12T18:36:14.620176Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:36:14.638810 waagent[1523]: 2024-04-12T18:36:14.638760Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Apr 12 18:36:14.707675 waagent[1523]: 2024-04-12T18:36:14.707548Z INFO ExtHandler Downloaded certificate {'thumbprint': 'C9A897268D9F04FB4E30CE7592E14637A5ACE6C8', 'hasPrivateKey': False} Apr 12 18:36:14.708872 waagent[1523]: 2024-04-12T18:36:14.708817Z INFO ExtHandler Downloaded certificate {'thumbprint': '532466DA56DA1751DAF05C444C7E9B6037259BAC', 'hasPrivateKey': True} Apr 12 18:36:14.710063 waagent[1523]: 2024-04-12T18:36:14.710006Z INFO ExtHandler Fetch goal state completed Apr 12 18:36:14.731517 waagent[1523]: 2024-04-12T18:36:14.731423Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Apr 12 18:36:14.743399 waagent[1523]: 2024-04-12T18:36:14.743319Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.8 running as process 1523 Apr 12 18:36:14.746960 waagent[1523]: 2024-04-12T18:36:14.746883Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:36:14.748484 waagent[1523]: 2024-04-12T18:36:14.748431Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:36:14.753172 waagent[1523]: 2024-04-12T18:36:14.753125Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:36:14.753637 waagent[1523]: 2024-04-12T18:36:14.753584Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:36:14.761388 waagent[1523]: 2024-04-12T18:36:14.761343Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:36:14.761980 waagent[1523]: 2024-04-12T18:36:14.761925Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:36:14.767693 waagent[1523]: 2024-04-12T18:36:14.767605Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Apr 12 18:36:14.768787 waagent[1523]: 2024-04-12T18:36:14.768729Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Apr 12 18:36:14.770395 waagent[1523]: 2024-04-12T18:36:14.770327Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:36:14.770666 waagent[1523]: 2024-04-12T18:36:14.770599Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:14.771230 waagent[1523]: 2024-04-12T18:36:14.771165Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:14.771814 waagent[1523]: 2024-04-12T18:36:14.771746Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:36:14.772431 waagent[1523]: 2024-04-12T18:36:14.772364Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:36:14.772673 waagent[1523]: 2024-04-12T18:36:14.772603Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:36:14.772673 waagent[1523]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:36:14.772673 waagent[1523]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:36:14.772673 waagent[1523]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:36:14.772673 waagent[1523]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:14.772673 waagent[1523]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:14.772673 waagent[1523]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:36:14.773464 waagent[1523]: 2024-04-12T18:36:14.773316Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:36:14.773595 waagent[1523]: 2024-04-12T18:36:14.773451Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:36:14.773809 waagent[1523]: 2024-04-12T18:36:14.773750Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:36:14.776047 waagent[1523]: 2024-04-12T18:36:14.774686Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:36:14.776788 waagent[1523]: 2024-04-12T18:36:14.776664Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:36:14.777035 waagent[1523]: 2024-04-12T18:36:14.776959Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:36:14.777208 waagent[1523]: 2024-04-12T18:36:14.777139Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:36:14.779509 waagent[1523]: 2024-04-12T18:36:14.779431Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:36:14.784071 waagent[1523]: 2024-04-12T18:36:14.783970Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:36:14.790054 waagent[1523]: 2024-04-12T18:36:14.789995Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:36:14.790778 waagent[1523]: 2024-04-12T18:36:14.790700Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:36:14.790778 waagent[1523]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:36:14.790778 waagent[1523]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:36:14.790778 waagent[1523]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:ad:26 brd ff:ff:ff:ff:ff:ff Apr 12 18:36:14.790778 waagent[1523]: 3: enP35173s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:ad:26 brd ff:ff:ff:ff:ff:ff\ altname enP35173p0s2 Apr 12 18:36:14.790778 waagent[1523]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:36:14.790778 waagent[1523]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:36:14.790778 waagent[1523]: 2: eth0 inet 10.200.20.19/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:36:14.790778 waagent[1523]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:36:14.790778 waagent[1523]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:36:14.790778 waagent[1523]: 2: eth0 inet6 fe80::20d:3aff:fe06:ad26/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:36:14.797427 waagent[1523]: 2024-04-12T18:36:14.797343Z INFO ExtHandler ExtHandler Downloading agent manifest Apr 12 18:36:14.816664 waagent[1523]: 2024-04-12T18:36:14.816607Z INFO ExtHandler ExtHandler Apr 12 18:36:14.816930 waagent[1523]: 2024-04-12T18:36:14.816867Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d5f6c34d-6b0b-4d01-9982-47f52d2052d5 correlation ae5de38b-413a-4254-96a8-0cbedadb7a93 created: 2024-04-12T18:33:52.569511Z] Apr 12 18:36:14.817864 waagent[1523]: 2024-04-12T18:36:14.817811Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Apr 12 18:36:14.819741 waagent[1523]: 2024-04-12T18:36:14.819690Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Apr 12 18:36:14.840016 waagent[1523]: 2024-04-12T18:36:14.839925Z INFO ExtHandler ExtHandler Looking for existing remote access users. Apr 12 18:36:14.865789 waagent[1523]: 2024-04-12T18:36:14.865720Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.8 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 8F2E0315-5278-4AEB-BA08-FE5E2C3BB137;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Apr 12 18:36:15.030545 waagent[1523]: 2024-04-12T18:36:15.030427Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Apr 12 18:36:15.030545 waagent[1523]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.030545 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.030545 waagent[1523]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.030545 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.030545 waagent[1523]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.030545 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.030545 waagent[1523]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:36:15.030545 waagent[1523]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:36:15.030545 waagent[1523]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:36:15.037856 waagent[1523]: 2024-04-12T18:36:15.037761Z INFO EnvHandler ExtHandler Current Firewall rules: Apr 12 18:36:15.037856 waagent[1523]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.037856 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.037856 waagent[1523]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.037856 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.037856 waagent[1523]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:36:15.037856 waagent[1523]: pkts bytes target prot opt in out source destination Apr 12 18:36:15.037856 waagent[1523]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:36:15.037856 waagent[1523]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:36:15.037856 waagent[1523]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:36:15.038635 waagent[1523]: 2024-04-12T18:36:15.038590Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Apr 12 18:36:35.582786 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Apr 12 18:36:46.365306 update_engine[1325]: I0412 18:36:46.364943 1325 update_attempter.cc:509] Updating boot flags... Apr 12 18:37:03.626583 systemd[1]: Created slice system-sshd.slice. Apr 12 18:37:03.627602 systemd[1]: Started sshd@0-10.200.20.19:22-10.200.12.6:55080.service. Apr 12 18:37:04.382726 sshd[1642]: Accepted publickey for core from 10.200.12.6 port 55080 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:04.402539 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:04.406122 systemd-logind[1323]: New session 3 of user core. Apr 12 18:37:04.406826 systemd[1]: Started session-3.scope. Apr 12 18:37:04.763066 systemd[1]: Started sshd@1-10.200.20.19:22-10.200.12.6:55094.service. Apr 12 18:37:05.167363 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 55094 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:05.167819 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:05.171696 systemd-logind[1323]: New session 4 of user core. Apr 12 18:37:05.172511 systemd[1]: Started session-4.scope. Apr 12 18:37:05.462499 sshd[1647]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:05.465327 systemd-logind[1323]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:37:05.466621 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:37:05.467584 systemd-logind[1323]: Removed session 4. Apr 12 18:37:05.468083 systemd[1]: sshd@1-10.200.20.19:22-10.200.12.6:55094.service: Deactivated successfully. Apr 12 18:37:05.529696 systemd[1]: Started sshd@2-10.200.20.19:22-10.200.12.6:46604.service. Apr 12 18:37:05.927523 sshd[1653]: Accepted publickey for core from 10.200.12.6 port 46604 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:05.928808 sshd[1653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:05.932521 systemd-logind[1323]: New session 5 of user core. Apr 12 18:37:05.932952 systemd[1]: Started session-5.scope. Apr 12 18:37:06.216574 sshd[1653]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:06.218942 systemd[1]: sshd@2-10.200.20.19:22-10.200.12.6:46604.service: Deactivated successfully. Apr 12 18:37:06.219571 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:37:06.220100 systemd-logind[1323]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:37:06.220876 systemd-logind[1323]: Removed session 5. Apr 12 18:37:06.288399 systemd[1]: Started sshd@3-10.200.20.19:22-10.200.12.6:46608.service. Apr 12 18:37:06.716769 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 46608 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:06.718395 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:06.722459 systemd[1]: Started session-6.scope. Apr 12 18:37:06.723703 systemd-logind[1323]: New session 6 of user core. Apr 12 18:37:07.031467 sshd[1659]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:07.034051 systemd[1]: sshd@3-10.200.20.19:22-10.200.12.6:46608.service: Deactivated successfully. Apr 12 18:37:07.034685 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:37:07.035195 systemd-logind[1323]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:37:07.035992 systemd-logind[1323]: Removed session 6. Apr 12 18:37:07.097638 systemd[1]: Started sshd@4-10.200.20.19:22-10.200.12.6:46612.service. Apr 12 18:37:07.493155 sshd[1665]: Accepted publickey for core from 10.200.12.6 port 46612 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:07.494392 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:07.498135 systemd-logind[1323]: New session 7 of user core. Apr 12 18:37:07.498507 systemd[1]: Started session-7.scope. Apr 12 18:37:08.112395 sudo[1668]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:37:08.112592 sudo[1668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:37:08.175135 dbus-daemon[1307]: avc: received setenforce notice (enforcing=1) Apr 12 18:37:08.176920 sudo[1668]: pam_unix(sudo:session): session closed for user root Apr 12 18:37:08.262576 sshd[1665]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:08.265617 systemd[1]: sshd@4-10.200.20.19:22-10.200.12.6:46612.service: Deactivated successfully. Apr 12 18:37:08.266406 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:37:08.267081 systemd-logind[1323]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:37:08.268080 systemd-logind[1323]: Removed session 7. Apr 12 18:37:08.328989 systemd[1]: Started sshd@5-10.200.20.19:22-10.200.12.6:46626.service. Apr 12 18:37:08.727909 sshd[1672]: Accepted publickey for core from 10.200.12.6 port 46626 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:08.729565 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:08.733247 systemd-logind[1323]: New session 8 of user core. Apr 12 18:37:08.733641 systemd[1]: Started session-8.scope. Apr 12 18:37:08.959201 sudo[1676]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:37:08.959694 sudo[1676]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:37:08.962322 sudo[1676]: pam_unix(sudo:session): session closed for user root Apr 12 18:37:08.966622 sudo[1675]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:37:08.966822 sudo[1675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:37:08.975152 systemd[1]: Stopping audit-rules.service... Apr 12 18:37:08.975000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:37:08.989607 auditctl[1679]: No rules Apr 12 18:37:08.975000 audit[1679]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc049e520 a2=420 a3=0 items=0 ppid=1 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:08.990221 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:37:08.990421 systemd[1]: Stopped audit-rules.service. Apr 12 18:37:08.992768 systemd[1]: Starting audit-rules.service... Apr 12 18:37:09.012391 kernel: audit: type=1305 audit(1712947028.975:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:37:09.012481 kernel: audit: type=1300 audit(1712947028.975:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc049e520 a2=420 a3=0 items=0 ppid=1 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:08.975000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:37:09.019396 kernel: audit: type=1327 audit(1712947028.975:171): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:37:09.019480 kernel: audit: type=1131 audit(1712947028.989:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:08.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.028663 augenrules[1696]: No rules Apr 12 18:37:09.029627 systemd[1]: Finished audit-rules.service. Apr 12 18:37:09.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.035845 sudo[1675]: pam_unix(sudo:session): session closed for user root Apr 12 18:37:09.050498 kernel: audit: type=1130 audit(1712947029.028:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.034000 audit[1675]: USER_END pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.069562 kernel: audit: type=1106 audit(1712947029.034:174): pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.035000 audit[1675]: CRED_DISP pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.085650 kernel: audit: type=1104 audit(1712947029.035:175): pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.120467 sshd[1672]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:09.120000 audit[1672]: USER_END pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.123253 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:37:09.123929 systemd[1]: sshd@5-10.200.20.19:22-10.200.12.6:46626.service: Deactivated successfully. Apr 12 18:37:09.125489 systemd-logind[1323]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:37:09.126330 systemd-logind[1323]: Removed session 8. Apr 12 18:37:09.120000 audit[1672]: CRED_DISP pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.160707 kernel: audit: type=1106 audit(1712947029.120:176): pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.160761 kernel: audit: type=1104 audit(1712947029.120:177): pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.160789 kernel: audit: type=1131 audit(1712947029.121:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.19:22-10.200.12.6:46626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.19:22-10.200.12.6:46626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.187161 systemd[1]: Started sshd@6-10.200.20.19:22-10.200.12.6:46638.service. Apr 12 18:37:09.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.19:22-10.200.12.6:46638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.583000 audit[1702]: USER_ACCT pid=1702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.584744 sshd[1702]: Accepted publickey for core from 10.200.12.6 port 46638 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:09.585000 audit[1702]: CRED_ACQ pid=1702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.585000 audit[1702]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5b9c5d0 a2=3 a3=1 items=0 ppid=1 pid=1702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:09.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:09.586252 sshd[1702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:09.590195 systemd[1]: Started session-9.scope. Apr 12 18:37:09.590592 systemd-logind[1323]: New session 9 of user core. Apr 12 18:37:09.593000 audit[1702]: USER_START pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.594000 audit[1704]: CRED_ACQ pid=1704 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:09.813000 audit[1705]: USER_ACCT pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.814000 audit[1705]: CRED_REFR pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:09.814959 sudo[1705]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:37:09.815162 sudo[1705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:37:09.815000 audit[1705]: USER_START pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:10.555359 systemd[1]: Reloading. Apr 12 18:37:10.626935 /usr/lib/systemd/system-generators/torcx-generator[1737]: time="2024-04-12T18:37:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:37:10.629713 /usr/lib/systemd/system-generators/torcx-generator[1737]: time="2024-04-12T18:37:10Z" level=info msg="torcx already run" Apr 12 18:37:10.709626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:37:10.709648 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:37:10.724962 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.796000 audit: BPF prog-id=35 op=LOAD Apr 12 18:37:10.796000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit: BPF prog-id=36 op=LOAD Apr 12 18:37:10.797000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit: BPF prog-id=37 op=LOAD Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.797000 audit: BPF prog-id=38 op=LOAD Apr 12 18:37:10.797000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:37:10.797000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit: BPF prog-id=39 op=LOAD Apr 12 18:37:10.798000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.798000 audit: BPF prog-id=40 op=LOAD Apr 12 18:37:10.798000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit: BPF prog-id=41 op=LOAD Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.799000 audit: BPF prog-id=42 op=LOAD Apr 12 18:37:10.799000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:37:10.799000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.800000 audit: BPF prog-id=43 op=LOAD Apr 12 18:37:10.800000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit: BPF prog-id=44 op=LOAD Apr 12 18:37:10.801000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit: BPF prog-id=45 op=LOAD Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit: BPF prog-id=46 op=LOAD Apr 12 18:37:10.802000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:37:10.802000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit: BPF prog-id=47 op=LOAD Apr 12 18:37:10.803000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit: BPF prog-id=48 op=LOAD Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:10.803000 audit: BPF prog-id=49 op=LOAD Apr 12 18:37:10.803000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:37:10.803000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:37:10.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:10.822788 systemd[1]: Started kubelet.service. Apr 12 18:37:10.850103 systemd[1]: Starting coreos-metadata.service... Apr 12 18:37:10.874852 kubelet[1793]: E0412 18:37:10.874785 1793 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:37:10.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:37:10.877304 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:37:10.877427 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:37:10.889688 coreos-metadata[1801]: Apr 12 18:37:10.889 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:37:10.892024 coreos-metadata[1801]: Apr 12 18:37:10.891 INFO Fetch successful Apr 12 18:37:10.892236 coreos-metadata[1801]: Apr 12 18:37:10.892 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Apr 12 18:37:10.893703 coreos-metadata[1801]: Apr 12 18:37:10.893 INFO Fetch successful Apr 12 18:37:10.894054 coreos-metadata[1801]: Apr 12 18:37:10.893 INFO Fetching http://168.63.129.16/machine/d4a7288f-dabd-4b0c-8bf5-ac89ade30528/d2fd0f1d%2D2ddd%2D4035%2Dba9a%2Def133e64aa2d.%5Fci%2D3510.3.3%2Da%2Dd058ff16f4?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Apr 12 18:37:10.895530 coreos-metadata[1801]: Apr 12 18:37:10.895 INFO Fetch successful Apr 12 18:37:10.929274 coreos-metadata[1801]: Apr 12 18:37:10.929 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:37:10.942398 coreos-metadata[1801]: Apr 12 18:37:10.942 INFO Fetch successful Apr 12 18:37:10.950750 systemd[1]: Finished coreos-metadata.service. Apr 12 18:37:10.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.413186 systemd[1]: Stopped kubelet.service. Apr 12 18:37:14.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.417456 kernel: kauditd_printk_skb: 186 callbacks suppressed Apr 12 18:37:14.417521 kernel: audit: type=1130 audit(1712947034.412:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.447920 kernel: audit: type=1131 audit(1712947034.412:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.457455 systemd[1]: Reloading. Apr 12 18:37:14.545998 /usr/lib/systemd/system-generators/torcx-generator[1858]: time="2024-04-12T18:37:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:37:14.546029 /usr/lib/systemd/system-generators/torcx-generator[1858]: time="2024-04-12T18:37:14Z" level=info msg="torcx already run" Apr 12 18:37:14.579158 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:37:14.579304 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:37:14.594568 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691544 kernel: audit: type=1400 audit(1712947034.662:365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691649 kernel: audit: type=1400 audit(1712947034.662:366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691677 kernel: audit: type=1400 audit(1712947034.662:367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.708005 kernel: audit: type=1400 audit(1712947034.662:368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739888 kernel: audit: type=1400 audit(1712947034.662:369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.756194 kernel: audit: type=1400 audit(1712947034.662:370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.756284 kernel: audit: type=1400 audit(1712947034.662:371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.772662 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit: BPF prog-id=50 op=LOAD Apr 12 18:37:14.677000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit: BPF prog-id=51 op=LOAD Apr 12 18:37:14.691000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit: BPF prog-id=52 op=LOAD Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit: BPF prog-id=53 op=LOAD Apr 12 18:37:14.723000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:37:14.723000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit: BPF prog-id=54 op=LOAD Apr 12 18:37:14.739000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.755000 audit: BPF prog-id=55 op=LOAD Apr 12 18:37:14.755000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:37:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit: BPF prog-id=56 op=LOAD Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.776000 audit: BPF prog-id=57 op=LOAD Apr 12 18:37:14.776000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:37:14.776000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.778000 audit: BPF prog-id=58 op=LOAD Apr 12 18:37:14.778000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit: BPF prog-id=59 op=LOAD Apr 12 18:37:14.779000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit: BPF prog-id=60 op=LOAD Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.779000 audit: BPF prog-id=61 op=LOAD Apr 12 18:37:14.779000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:37:14.779000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit: BPF prog-id=62 op=LOAD Apr 12 18:37:14.780000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit: BPF prog-id=63 op=LOAD Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:14.780000 audit: BPF prog-id=64 op=LOAD Apr 12 18:37:14.780000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:37:14.780000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:37:14.805958 systemd[1]: Started kubelet.service. Apr 12 18:37:14.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:14.852138 kubelet[1917]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:37:14.852478 kubelet[1917]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:37:14.852532 kubelet[1917]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:37:14.852665 kubelet[1917]: I0412 18:37:14.852630 1917 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:37:15.279452 kubelet[1917]: I0412 18:37:15.279415 1917 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:37:15.279452 kubelet[1917]: I0412 18:37:15.279446 1917 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:37:15.279662 kubelet[1917]: I0412 18:37:15.279642 1917 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:37:15.283578 kubelet[1917]: W0412 18:37:15.283553 1917 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:37:15.284053 kubelet[1917]: I0412 18:37:15.284032 1917 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:37:15.284237 kubelet[1917]: I0412 18:37:15.284218 1917 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:37:15.284315 kubelet[1917]: I0412 18:37:15.284300 1917 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:37:15.284390 kubelet[1917]: I0412 18:37:15.284323 1917 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:37:15.284390 kubelet[1917]: I0412 18:37:15.284336 1917 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:37:15.284451 kubelet[1917]: I0412 18:37:15.284435 1917 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:37:15.285552 kubelet[1917]: I0412 18:37:15.285525 1917 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:37:15.291427 kubelet[1917]: I0412 18:37:15.291408 1917 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:37:15.291889 kubelet[1917]: I0412 18:37:15.291874 1917 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:37:15.292044 kubelet[1917]: I0412 18:37:15.292033 1917 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:37:15.292215 kubelet[1917]: I0412 18:37:15.292201 1917 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:37:15.292588 kubelet[1917]: E0412 18:37:15.292147 1917 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:15.292588 kubelet[1917]: E0412 18:37:15.292174 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:15.293375 kubelet[1917]: I0412 18:37:15.293351 1917 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:37:15.293685 kubelet[1917]: W0412 18:37:15.293667 1917 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:37:15.294228 kubelet[1917]: I0412 18:37:15.294200 1917 server.go:1168] "Started kubelet" Apr 12 18:37:15.294483 kubelet[1917]: I0412 18:37:15.294467 1917 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:37:15.294749 kubelet[1917]: I0412 18:37:15.294695 1917 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:37:15.295537 kubelet[1917]: I0412 18:37:15.295521 1917 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:37:15.297635 kubelet[1917]: E0412 18:37:15.297525 1917 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:37:15.297635 kubelet[1917]: E0412 18:37:15.297568 1917 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:37:15.297000 audit[1917]: AVC avc: denied { mac_admin } for pid=1917 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:15.297000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:37:15.297000 audit[1917]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cf4660 a1=40009d8cf0 a2=4000cf4630 a3=25 items=0 ppid=1 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.297000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:37:15.298717 kubelet[1917]: I0412 18:37:15.298702 1917 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:37:15.297000 audit[1917]: AVC avc: denied { mac_admin } for pid=1917 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:15.297000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:37:15.297000 audit[1917]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c70420 a1=40009d8d08 a2=4000cf46f0 a3=25 items=0 ppid=1 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.297000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:37:15.298998 kubelet[1917]: I0412 18:37:15.298986 1917 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:37:15.299133 kubelet[1917]: I0412 18:37:15.299121 1917 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:37:15.303302 kubelet[1917]: I0412 18:37:15.303281 1917 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:37:15.306073 kubelet[1917]: I0412 18:37:15.306042 1917 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:37:15.308112 kubelet[1917]: E0412 18:37:15.307991 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c5c49c55", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 294178389, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 294178389, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.308435 kubelet[1917]: W0412 18:37:15.308392 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:37:15.308435 kubelet[1917]: E0412 18:37:15.308432 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:37:15.308562 kubelet[1917]: W0412 18:37:15.308537 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:37:15.308562 kubelet[1917]: E0412 18:37:15.308563 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:37:15.309286 kubelet[1917]: E0412 18:37:15.309249 1917 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:37:15.310030 kubelet[1917]: E0412 18:37:15.309890 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c5f8303e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 297558590, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 297558590, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.310224 kubelet[1917]: W0412 18:37:15.310207 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:37:15.310311 kubelet[1917]: E0412 18:37:15.310299 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:37:15.326000 audit[1928]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.326000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc12ab820 a2=0 a3=1 items=0 ppid=1917 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:37:15.329608 kubelet[1917]: I0412 18:37:15.329588 1917 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:37:15.329745 kubelet[1917]: I0412 18:37:15.329734 1917 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:37:15.329804 kubelet[1917]: I0412 18:37:15.329795 1917 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:37:15.330181 kubelet[1917]: E0412 18:37:15.330060 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d1fd37", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.19 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328609591, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328609591, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.331140 kubelet[1917]: E0412 18:37:15.331068 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21137", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.19 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328614711, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328614711, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.330000 audit[1931]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.330000 audit[1931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd1e50e10 a2=0 a3=1 items=0 ppid=1917 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:37:15.333756 kubelet[1917]: E0412 18:37:15.331935 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21d3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.19 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328617791, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328617791, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.333000 audit[1934]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.333000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffb9f0860 a2=0 a3=1 items=0 ppid=1917 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:37:15.334977 kubelet[1917]: I0412 18:37:15.334959 1917 policy_none.go:49] "None policy: Start" Apr 12 18:37:15.335961 kubelet[1917]: I0412 18:37:15.335946 1917 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:37:15.336101 kubelet[1917]: I0412 18:37:15.336092 1917 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:37:15.335000 audit[1936]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.335000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff4cc7fc0 a2=0 a3=1 items=0 ppid=1917 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:37:15.344453 systemd[1]: Created slice kubepods.slice. Apr 12 18:37:15.348550 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:37:15.358118 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:37:15.359689 kubelet[1917]: I0412 18:37:15.359659 1917 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:37:15.358000 audit[1917]: AVC avc: denied { mac_admin } for pid=1917 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:15.358000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:37:15.358000 audit[1917]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400038b080 a1=4000571578 a2=400038b050 a3=25 items=0 ppid=1 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.358000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:37:15.360013 kubelet[1917]: I0412 18:37:15.359731 1917 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:37:15.360013 kubelet[1917]: I0412 18:37:15.359925 1917 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:37:15.361105 kubelet[1917]: E0412 18:37:15.361077 1917 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.19\" not found" Apr 12 18:37:15.369336 kubelet[1917]: E0412 18:37:15.369242 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40ca2a11d9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 367936473, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 367936473, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.374000 audit[1939]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.374000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff790da20 a2=0 a3=1 items=0 ppid=1917 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:37:15.375850 kubelet[1917]: I0412 18:37:15.375833 1917 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:37:15.376000 audit[1942]: NETFILTER_CFG table=mangle:10 family=2 entries=1 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.376000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff77ef7a0 a2=0 a3=1 items=0 ppid=1917 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.376000 audit[1941]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:15.376000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdc67abe0 a2=0 a3=1 items=0 ppid=1917 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:37:15.377447 kubelet[1917]: I0412 18:37:15.377433 1917 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:37:15.377546 kubelet[1917]: I0412 18:37:15.377536 1917 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:37:15.377608 kubelet[1917]: I0412 18:37:15.377599 1917 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:37:15.377724 kubelet[1917]: E0412 18:37:15.377712 1917 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:37:15.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:37:15.378954 kubelet[1917]: W0412 18:37:15.378937 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:37:15.379050 kubelet[1917]: E0412 18:37:15.379039 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:37:15.378000 audit[1943]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:15.378000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef8c72b0 a2=0 a3=1 items=0 ppid=1917 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:37:15.379000 audit[1945]: NETFILTER_CFG table=nat:13 family=10 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:15.379000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffcd89e10 a2=0 a3=1 items=0 ppid=1917 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.380000 audit[1944]: NETFILTER_CFG table=nat:14 family=2 entries=2 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.380000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff901fc50 a2=0 a3=1 items=0 ppid=1917 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:37:15.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:37:15.381000 audit[1947]: NETFILTER_CFG table=filter:15 family=10 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:15.381000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb6e9b50 a2=0 a3=1 items=0 ppid=1917 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.381000 audit[1946]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:15.381000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcdb72610 a2=0 a3=1 items=0 ppid=1917 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:15.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:37:15.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:37:15.404755 kubelet[1917]: I0412 18:37:15.404720 1917 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.19" Apr 12 18:37:15.406135 kubelet[1917]: E0412 18:37:15.406063 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d1fd37", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.19 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328609591, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 404674875, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d1fd37" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.406571 kubelet[1917]: E0412 18:37:15.406552 1917 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.19" Apr 12 18:37:15.407032 kubelet[1917]: E0412 18:37:15.406977 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21137", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.19 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328614711, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 404688115, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21137" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.407841 kubelet[1917]: E0412 18:37:15.407789 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21d3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.19 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328617791, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 404691355, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21d3f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.510424 kubelet[1917]: E0412 18:37:15.510401 1917 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:37:15.607358 kubelet[1917]: I0412 18:37:15.607276 1917 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.19" Apr 12 18:37:15.608708 kubelet[1917]: E0412 18:37:15.608639 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d1fd37", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.19 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328609591, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 607244206, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d1fd37" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.609060 kubelet[1917]: E0412 18:37:15.609044 1917 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.19" Apr 12 18:37:15.609628 kubelet[1917]: E0412 18:37:15.609580 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21137", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.19 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328614711, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 607249326, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21137" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.610427 kubelet[1917]: E0412 18:37:15.610374 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21d3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.19 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328617791, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 607252606, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21d3f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:15.911555 kubelet[1917]: E0412 18:37:15.911531 1917 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:37:16.010881 kubelet[1917]: I0412 18:37:16.010862 1917 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.19" Apr 12 18:37:16.011995 kubelet[1917]: E0412 18:37:16.011974 1917 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.19" Apr 12 18:37:16.012116 kubelet[1917]: E0412 18:37:16.011965 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d1fd37", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.19 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328609591, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 10824787, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d1fd37" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:16.013113 kubelet[1917]: E0412 18:37:16.013055 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21137", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.19 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328614711, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 10834307, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21137" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:16.013791 kubelet[1917]: E0412 18:37:16.013732 1917 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19.17c59c40c7d21d3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.19", UID:"10.200.20.19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.19 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.19"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 37, 15, 328617791, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 10837307, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.19.17c59c40c7d21d3f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:37:16.156100 kubelet[1917]: W0412 18:37:16.156077 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:37:16.156182 kubelet[1917]: E0412 18:37:16.156107 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:37:16.190193 kubelet[1917]: W0412 18:37:16.190119 1917 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:37:16.190301 kubelet[1917]: E0412 18:37:16.190288 1917 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:37:16.287677 kubelet[1917]: I0412 18:37:16.287650 1917 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:37:16.292839 kubelet[1917]: E0412 18:37:16.292822 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:16.662143 kubelet[1917]: E0412 18:37:16.662118 1917 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.19" not found Apr 12 18:37:16.715198 kubelet[1917]: E0412 18:37:16.715171 1917 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.19\" not found" node="10.200.20.19" Apr 12 18:37:16.813188 kubelet[1917]: I0412 18:37:16.813167 1917 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.19" Apr 12 18:37:16.817929 kubelet[1917]: I0412 18:37:16.817905 1917 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.19" Apr 12 18:37:16.826357 kubelet[1917]: E0412 18:37:16.826330 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:16.927293 kubelet[1917]: E0412 18:37:16.927199 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.028016 kubelet[1917]: E0412 18:37:17.027988 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.129054 kubelet[1917]: E0412 18:37:17.129027 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.229581 kubelet[1917]: E0412 18:37:17.229512 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.293852 kubelet[1917]: E0412 18:37:17.293828 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:17.321000 audit[1705]: USER_END pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:17.321000 audit[1705]: CRED_DISP pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:37:17.322598 sudo[1705]: pam_unix(sudo:session): session closed for user root Apr 12 18:37:17.330372 kubelet[1917]: E0412 18:37:17.330342 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.386283 sshd[1702]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:17.386000 audit[1702]: USER_END pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.386000 audit[1702]: CRED_DISP pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.388723 systemd[1]: sshd@6-10.200.20.19:22-10.200.12.6:46638.service: Deactivated successfully. Apr 12 18:37:17.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.19:22-10.200.12.6:46638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:17.389445 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:37:17.390041 systemd-logind[1323]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:37:17.391011 systemd-logind[1323]: Removed session 9. Apr 12 18:37:17.431172 kubelet[1917]: E0412 18:37:17.431143 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.531837 kubelet[1917]: E0412 18:37:17.531760 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.632270 kubelet[1917]: E0412 18:37:17.632247 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.732702 kubelet[1917]: E0412 18:37:17.732678 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.833303 kubelet[1917]: E0412 18:37:17.833232 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:17.933767 kubelet[1917]: E0412 18:37:17.933736 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.034574 kubelet[1917]: E0412 18:37:18.034546 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.135025 kubelet[1917]: E0412 18:37:18.135001 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.235494 kubelet[1917]: E0412 18:37:18.235472 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.294790 kubelet[1917]: E0412 18:37:18.294775 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:18.336217 kubelet[1917]: E0412 18:37:18.336200 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.436929 kubelet[1917]: E0412 18:37:18.436834 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.537374 kubelet[1917]: E0412 18:37:18.537334 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.637822 kubelet[1917]: E0412 18:37:18.637800 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.738294 kubelet[1917]: E0412 18:37:18.738233 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.838848 kubelet[1917]: E0412 18:37:18.838820 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:18.939331 kubelet[1917]: E0412 18:37:18.939304 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:19.039798 kubelet[1917]: E0412 18:37:19.039738 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:19.140260 kubelet[1917]: E0412 18:37:19.140224 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:19.240627 kubelet[1917]: E0412 18:37:19.240605 1917 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.19\" not found" Apr 12 18:37:19.295807 kubelet[1917]: E0412 18:37:19.295719 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:19.295965 kubelet[1917]: I0412 18:37:19.295721 1917 apiserver.go:52] "Watching apiserver" Apr 12 18:37:19.298508 kubelet[1917]: I0412 18:37:19.298484 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:37:19.298717 kubelet[1917]: I0412 18:37:19.298703 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:37:19.298851 kubelet[1917]: I0412 18:37:19.298839 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:37:19.299559 kubelet[1917]: E0412 18:37:19.299540 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:19.303803 systemd[1]: Created slice kubepods-besteffort-pod325be153_3fe4_47c0_9b9c_b5dada272657.slice. Apr 12 18:37:19.306877 kubelet[1917]: I0412 18:37:19.306849 1917 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:37:19.312631 systemd[1]: Created slice kubepods-besteffort-pod4c9e0c65_c32e_42db_a546_96782b4b8d0c.slice. Apr 12 18:37:19.326819 kubelet[1917]: I0412 18:37:19.326746 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-cni-log-dir\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.326935 kubelet[1917]: I0412 18:37:19.326917 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4c9e0c65-c32e-42db-a546-96782b4b8d0c-kube-proxy\") pod \"kube-proxy-blgl9\" (UID: \"4c9e0c65-c32e-42db-a546-96782b4b8d0c\") " pod="kube-system/kube-proxy-blgl9" Apr 12 18:37:19.326966 kubelet[1917]: I0412 18:37:19.326941 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-xtables-lock\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327021 kubelet[1917]: I0412 18:37:19.327004 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-var-run-calico\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327581 kubelet[1917]: I0412 18:37:19.327497 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jsbmn\" (UniqueName: \"kubernetes.io/projected/4c9e0c65-c32e-42db-a546-96782b4b8d0c-kube-api-access-jsbmn\") pod \"kube-proxy-blgl9\" (UID: \"4c9e0c65-c32e-42db-a546-96782b4b8d0c\") " pod="kube-system/kube-proxy-blgl9" Apr 12 18:37:19.327640 kubelet[1917]: I0412 18:37:19.327604 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/325be153-3fe4-47c0-9b9c-b5dada272657-node-certs\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327640 kubelet[1917]: I0412 18:37:19.327627 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/68bdb281-9a58-4c5a-9cd8-d1da00950aca-varrun\") pod \"csi-node-driver-zshnt\" (UID: \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\") " pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:19.327684 kubelet[1917]: I0412 18:37:19.327656 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-67lhx\" (UniqueName: \"kubernetes.io/projected/325be153-3fe4-47c0-9b9c-b5dada272657-kube-api-access-67lhx\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327684 kubelet[1917]: I0412 18:37:19.327676 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/68bdb281-9a58-4c5a-9cd8-d1da00950aca-kubelet-dir\") pod \"csi-node-driver-zshnt\" (UID: \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\") " pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:19.327725 kubelet[1917]: I0412 18:37:19.327700 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2jqt7\" (UniqueName: \"kubernetes.io/projected/68bdb281-9a58-4c5a-9cd8-d1da00950aca-kube-api-access-2jqt7\") pod \"csi-node-driver-zshnt\" (UID: \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\") " pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:19.327752 kubelet[1917]: I0412 18:37:19.327728 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4c9e0c65-c32e-42db-a546-96782b4b8d0c-xtables-lock\") pod \"kube-proxy-blgl9\" (UID: \"4c9e0c65-c32e-42db-a546-96782b4b8d0c\") " pod="kube-system/kube-proxy-blgl9" Apr 12 18:37:19.327752 kubelet[1917]: I0412 18:37:19.327746 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-policysync\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327796 kubelet[1917]: I0412 18:37:19.327782 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-cni-net-dir\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327834 kubelet[1917]: I0412 18:37:19.327817 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-var-lib-calico\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327864 kubelet[1917]: I0412 18:37:19.327847 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-cni-bin-dir\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327905 kubelet[1917]: I0412 18:37:19.327867 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-flexvol-driver-host\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.327933 kubelet[1917]: I0412 18:37:19.327908 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/68bdb281-9a58-4c5a-9cd8-d1da00950aca-socket-dir\") pod \"csi-node-driver-zshnt\" (UID: \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\") " pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:19.327933 kubelet[1917]: I0412 18:37:19.327931 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/68bdb281-9a58-4c5a-9cd8-d1da00950aca-registration-dir\") pod \"csi-node-driver-zshnt\" (UID: \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\") " pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:19.327982 kubelet[1917]: I0412 18:37:19.327966 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4c9e0c65-c32e-42db-a546-96782b4b8d0c-lib-modules\") pod \"kube-proxy-blgl9\" (UID: \"4c9e0c65-c32e-42db-a546-96782b4b8d0c\") " pod="kube-system/kube-proxy-blgl9" Apr 12 18:37:19.328004 kubelet[1917]: I0412 18:37:19.327985 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/325be153-3fe4-47c0-9b9c-b5dada272657-lib-modules\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.328028 kubelet[1917]: I0412 18:37:19.328008 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/325be153-3fe4-47c0-9b9c-b5dada272657-tigera-ca-bundle\") pod \"calico-node-vtc86\" (UID: \"325be153-3fe4-47c0-9b9c-b5dada272657\") " pod="calico-system/calico-node-vtc86" Apr 12 18:37:19.328051 kubelet[1917]: I0412 18:37:19.328022 1917 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:37:19.342035 kubelet[1917]: I0412 18:37:19.342016 1917 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:37:19.342423 env[1334]: time="2024-04-12T18:37:19.342385832Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:37:19.342840 kubelet[1917]: I0412 18:37:19.342825 1917 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:37:19.431851 kubelet[1917]: E0412 18:37:19.431827 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.432046 kubelet[1917]: W0412 18:37:19.432023 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.432663 kubelet[1917]: E0412 18:37:19.432647 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.432767 kubelet[1917]: W0412 18:37:19.432749 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.433018 kubelet[1917]: E0412 18:37:19.433007 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.433099 kubelet[1917]: W0412 18:37:19.433088 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.433588 kubelet[1917]: E0412 18:37:19.433575 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.433684 kubelet[1917]: W0412 18:37:19.433672 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.433773 kubelet[1917]: E0412 18:37:19.433758 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.434005 kubelet[1917]: E0412 18:37:19.433993 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.434081 kubelet[1917]: W0412 18:37:19.434065 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.434174 kubelet[1917]: E0412 18:37:19.434164 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.434396 kubelet[1917]: E0412 18:37:19.434380 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.434476 kubelet[1917]: W0412 18:37:19.434465 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.434546 kubelet[1917]: E0412 18:37:19.434526 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.434797 kubelet[1917]: E0412 18:37:19.434786 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.434865 kubelet[1917]: W0412 18:37:19.434854 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.434954 kubelet[1917]: E0412 18:37:19.434944 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.435707 kubelet[1917]: E0412 18:37:19.435685 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.435864 kubelet[1917]: E0412 18:37:19.435847 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.436111 kubelet[1917]: E0412 18:37:19.436100 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.436192 kubelet[1917]: W0412 18:37:19.436173 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.436278 kubelet[1917]: E0412 18:37:19.436269 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.436494 kubelet[1917]: E0412 18:37:19.436477 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.436577 kubelet[1917]: W0412 18:37:19.436566 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.436655 kubelet[1917]: E0412 18:37:19.436645 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.436923 kubelet[1917]: E0412 18:37:19.436912 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.437007 kubelet[1917]: W0412 18:37:19.436996 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.437071 kubelet[1917]: E0412 18:37:19.437054 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.437164 kubelet[1917]: E0412 18:37:19.437130 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.437407 kubelet[1917]: E0412 18:37:19.437397 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.437492 kubelet[1917]: W0412 18:37:19.437481 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.437561 kubelet[1917]: E0412 18:37:19.437541 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.437794 kubelet[1917]: E0412 18:37:19.437765 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.437871 kubelet[1917]: W0412 18:37:19.437861 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.437988 kubelet[1917]: E0412 18:37:19.437979 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.438219 kubelet[1917]: E0412 18:37:19.438208 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.438306 kubelet[1917]: W0412 18:37:19.438294 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.438380 kubelet[1917]: E0412 18:37:19.438370 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.445440 kubelet[1917]: E0412 18:37:19.445421 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.445540 kubelet[1917]: W0412 18:37:19.445528 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.445613 kubelet[1917]: E0412 18:37:19.445603 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.446108 kubelet[1917]: E0412 18:37:19.446096 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.446196 kubelet[1917]: W0412 18:37:19.446184 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.446249 kubelet[1917]: E0412 18:37:19.446240 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.453451 kubelet[1917]: E0412 18:37:19.453218 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.453451 kubelet[1917]: W0412 18:37:19.453237 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.453451 kubelet[1917]: E0412 18:37:19.453268 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.454419 kubelet[1917]: E0412 18:37:19.454393 1917 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:37:19.454419 kubelet[1917]: W0412 18:37:19.454410 1917 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:37:19.454419 kubelet[1917]: E0412 18:37:19.454423 1917 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:37:19.614349 env[1334]: time="2024-04-12T18:37:19.611734565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vtc86,Uid:325be153-3fe4-47c0-9b9c-b5dada272657,Namespace:calico-system,Attempt:0,}" Apr 12 18:37:19.618341 env[1334]: time="2024-04-12T18:37:19.618167405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-blgl9,Uid:4c9e0c65-c32e-42db-a546-96782b4b8d0c,Namespace:kube-system,Attempt:0,}" Apr 12 18:37:20.296370 kubelet[1917]: E0412 18:37:20.296328 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:20.817315 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3690310669.mount: Deactivated successfully. Apr 12 18:37:20.848547 env[1334]: time="2024-04-12T18:37:20.848489582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.852600 env[1334]: time="2024-04-12T18:37:20.852566742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.863820 env[1334]: time="2024-04-12T18:37:20.863772383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.869071 env[1334]: time="2024-04-12T18:37:20.869040143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.871367 env[1334]: time="2024-04-12T18:37:20.871329823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.877353 env[1334]: time="2024-04-12T18:37:20.877325983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.881951 env[1334]: time="2024-04-12T18:37:20.881914584Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.887864 env[1334]: time="2024-04-12T18:37:20.887833544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:20.971006 env[1334]: time="2024-04-12T18:37:20.966974188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:37:20.971006 env[1334]: time="2024-04-12T18:37:20.967024708Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:37:20.971006 env[1334]: time="2024-04-12T18:37:20.967036228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:37:20.971006 env[1334]: time="2024-04-12T18:37:20.967168588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84 pid=1979 runtime=io.containerd.runc.v2 Apr 12 18:37:20.972645 env[1334]: time="2024-04-12T18:37:20.972494668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:37:20.972645 env[1334]: time="2024-04-12T18:37:20.972531948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:37:20.972645 env[1334]: time="2024-04-12T18:37:20.972542228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:37:20.972936 env[1334]: time="2024-04-12T18:37:20.972829508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04a3a5f91b7c84e6e641f6b188b39d6d8edabcd8d57008d035a33eea321873e3 pid=1995 runtime=io.containerd.runc.v2 Apr 12 18:37:20.997636 systemd[1]: Started cri-containerd-04a3a5f91b7c84e6e641f6b188b39d6d8edabcd8d57008d035a33eea321873e3.scope. Apr 12 18:37:20.998660 systemd[1]: Started cri-containerd-ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84.scope. Apr 12 18:37:21.019949 kernel: kauditd_printk_skb: 220 callbacks suppressed Apr 12 18:37:21.020072 kernel: audit: type=1400 audit(1712947041.008:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.047533 kernel: audit: type=1400 audit(1712947041.008:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.066129 kernel: audit: type=1400 audit(1712947041.008:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.066874 kernel: audit: type=1400 audit(1712947041.008:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.095621 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:37:21.095746 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:37:21.095822 kernel: audit: type=1400 audit(1712947041.008:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.116082 kernel: audit: backlog limit exceeded Apr 12 18:37:21.116169 kernel: audit: type=1400 audit(1712947041.008:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.013000 audit: BPF prog-id=65 op=LOAD Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1979 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.133957 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:37:21.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336633633764653134646434623134376539326630613832353737 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1979 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336633633764653134646434623134376539326630613832353737 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.030000 audit: BPF prog-id=66 op=LOAD Apr 12 18:37:21.030000 audit[2005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1979 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336633633764653134646434623134376539326630613832353737 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit: BPF prog-id=67 op=LOAD Apr 12 18:37:21.046000 audit[2005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1979 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336633633764653134646434623134376539326630613832353737 Apr 12 18:37:21.046000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:37:21.046000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { perfmon } for pid=2005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit[2005]: AVC avc: denied { bpf } for pid=2005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.046000 audit: BPF prog-id=68 op=LOAD Apr 12 18:37:21.046000 audit[2005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1979 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336633633764653134646434623134376539326630613832353737 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1995 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613361356639316237633834653665363431663662313838623339 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1995 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613361356639316237633834653665363431663662313838623339 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit: BPF prog-id=70 op=LOAD Apr 12 18:37:21.139000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1995 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613361356639316237633834653665363431663662313838623339 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit: BPF prog-id=71 op=LOAD Apr 12 18:37:21.139000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1995 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613361356639316237633834653665363431663662313838623339 Apr 12 18:37:21.139000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:37:21.139000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:21.139000 audit: BPF prog-id=72 op=LOAD Apr 12 18:37:21.139000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1995 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613361356639316237633834653665363431663662313838623339 Apr 12 18:37:21.155932 env[1334]: time="2024-04-12T18:37:21.155484916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vtc86,Uid:325be153-3fe4-47c0-9b9c-b5dada272657,Namespace:calico-system,Attempt:0,} returns sandbox id \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\"" Apr 12 18:37:21.158175 env[1334]: time="2024-04-12T18:37:21.157578396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:37:21.166011 env[1334]: time="2024-04-12T18:37:21.165971317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-blgl9,Uid:4c9e0c65-c32e-42db-a546-96782b4b8d0c,Namespace:kube-system,Attempt:0,} returns sandbox id \"04a3a5f91b7c84e6e641f6b188b39d6d8edabcd8d57008d035a33eea321873e3\"" Apr 12 18:37:21.297043 kubelet[1917]: E0412 18:37:21.297008 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:21.381401 kubelet[1917]: E0412 18:37:21.378756 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:22.298062 kubelet[1917]: E0412 18:37:22.298025 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:22.665421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount324038638.mount: Deactivated successfully. Apr 12 18:37:22.810945 env[1334]: time="2024-04-12T18:37:22.810872310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:22.815663 env[1334]: time="2024-04-12T18:37:22.815629470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:22.819493 env[1334]: time="2024-04-12T18:37:22.819461070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:22.822930 env[1334]: time="2024-04-12T18:37:22.822890230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:22.823502 env[1334]: time="2024-04-12T18:37:22.823479750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:37:22.825051 env[1334]: time="2024-04-12T18:37:22.825030230Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:37:22.826484 env[1334]: time="2024-04-12T18:37:22.826400030Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:37:22.853585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3529677039.mount: Deactivated successfully. Apr 12 18:37:22.874132 env[1334]: time="2024-04-12T18:37:22.874065232Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e\"" Apr 12 18:37:22.875188 env[1334]: time="2024-04-12T18:37:22.875160393Z" level=info msg="StartContainer for \"493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e\"" Apr 12 18:37:22.896201 systemd[1]: Started cri-containerd-493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e.scope. Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1979 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:22.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336434306261336435306536626636653537653132313165623165 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit: BPF prog-id=73 op=LOAD Apr 12 18:37:22.914000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1979 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:22.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336434306261336435306536626636653537653132313165623165 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit: BPF prog-id=74 op=LOAD Apr 12 18:37:22.914000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1979 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:22.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336434306261336435306536626636653537653132313165623165 Apr 12 18:37:22.914000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:37:22.914000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:22.914000 audit: BPF prog-id=75 op=LOAD Apr 12 18:37:22.914000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1979 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:22.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336434306261336435306536626636653537653132313165623165 Apr 12 18:37:22.936859 systemd[1]: cri-containerd-493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e.scope: Deactivated successfully. Apr 12 18:37:22.940000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:37:22.942880 env[1334]: time="2024-04-12T18:37:22.942842835Z" level=info msg="StartContainer for \"493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e\" returns successfully" Apr 12 18:37:23.082400 env[1334]: time="2024-04-12T18:37:23.082357162Z" level=info msg="shim disconnected" id=493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e Apr 12 18:37:23.082655 env[1334]: time="2024-04-12T18:37:23.082636722Z" level=warning msg="cleaning up after shim disconnected" id=493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e namespace=k8s.io Apr 12 18:37:23.082726 env[1334]: time="2024-04-12T18:37:23.082713362Z" level=info msg="cleaning up dead shim" Apr 12 18:37:23.090427 env[1334]: time="2024-04-12T18:37:23.090380562Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:37:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2105 runtime=io.containerd.runc.v2\n" Apr 12 18:37:23.299017 kubelet[1917]: E0412 18:37:23.298556 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:23.380122 kubelet[1917]: E0412 18:37:23.379804 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:23.852112 systemd[1]: run-containerd-runc-k8s.io-493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e-runc.3E3c6a.mount: Deactivated successfully. Apr 12 18:37:23.852197 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-493d40ba3d50e6bf6e57e1211eb1e9db3b7ff808e9079c865926ea57b689560e-rootfs.mount: Deactivated successfully. Apr 12 18:37:24.035824 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2241293621.mount: Deactivated successfully. Apr 12 18:37:24.298971 kubelet[1917]: E0412 18:37:24.298928 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:24.474847 env[1334]: time="2024-04-12T18:37:24.474795541Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:24.479797 env[1334]: time="2024-04-12T18:37:24.479761501Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:24.483529 env[1334]: time="2024-04-12T18:37:24.483500461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:24.486419 env[1334]: time="2024-04-12T18:37:24.486390901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:24.486719 env[1334]: time="2024-04-12T18:37:24.486689061Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06\"" Apr 12 18:37:24.487651 env[1334]: time="2024-04-12T18:37:24.487619861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:37:24.488725 env[1334]: time="2024-04-12T18:37:24.488696101Z" level=info msg="CreateContainer within sandbox \"04a3a5f91b7c84e6e641f6b188b39d6d8edabcd8d57008d035a33eea321873e3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:37:24.513135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1797708271.mount: Deactivated successfully. Apr 12 18:37:24.529072 env[1334]: time="2024-04-12T18:37:24.529028663Z" level=info msg="CreateContainer within sandbox \"04a3a5f91b7c84e6e641f6b188b39d6d8edabcd8d57008d035a33eea321873e3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"76dc7247c150d149ef7cd0b2467e1ed907c67ff2173c614d98db3c32b42c8bd3\"" Apr 12 18:37:24.529764 env[1334]: time="2024-04-12T18:37:24.529704463Z" level=info msg="StartContainer for \"76dc7247c150d149ef7cd0b2467e1ed907c67ff2173c614d98db3c32b42c8bd3\"" Apr 12 18:37:24.544078 systemd[1]: Started cri-containerd-76dc7247c150d149ef7cd0b2467e1ed907c67ff2173c614d98db3c32b42c8bd3.scope. Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736646337323437633135306431343965663763643062323436376531 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit: BPF prog-id=76 op=LOAD Apr 12 18:37:24.558000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1995 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736646337323437633135306431343965663763643062323436376531 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit: BPF prog-id=77 op=LOAD Apr 12 18:37:24.558000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1995 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736646337323437633135306431343965663763643062323436376531 Apr 12 18:37:24.558000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:37:24.558000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:24.558000 audit: BPF prog-id=78 op=LOAD Apr 12 18:37:24.558000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1995 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736646337323437633135306431343965663763643062323436376531 Apr 12 18:37:24.585247 env[1334]: time="2024-04-12T18:37:24.585194505Z" level=info msg="StartContainer for \"76dc7247c150d149ef7cd0b2467e1ed907c67ff2173c614d98db3c32b42c8bd3\" returns successfully" Apr 12 18:37:24.625000 audit[2179]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.625000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcadcda50 a2=0 a3=1 items=0 ppid=2141 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:37:24.627000 audit[2180]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.627000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd40659d0 a2=0 a3=1 items=0 ppid=2141 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:37:24.627000 audit[2181]: NETFILTER_CFG table=mangle:19 family=10 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:24.627000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd22e780 a2=0 a3=1 items=0 ppid=2141 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:37:24.628000 audit[2182]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:24.628000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe08cb720 a2=0 a3=1 items=0 ppid=2141 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:37:24.629000 audit[2183]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.629000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2e6ab00 a2=0 a3=1 items=0 ppid=2141 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:37:24.632000 audit[2184]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:24.632000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee2cb770 a2=0 a3=1 items=0 ppid=2141 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:37:24.733000 audit[2185]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.733000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffbbbaa70 a2=0 a3=1 items=0 ppid=2141 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:37:24.735000 audit[2187]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.735000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff7ec5c60 a2=0 a3=1 items=0 ppid=2141 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:37:24.738000 audit[2190]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.738000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff7144cc0 a2=0 a3=1 items=0 ppid=2141 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:37:24.739000 audit[2191]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.739000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd1ce270 a2=0 a3=1 items=0 ppid=2141 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:37:24.741000 audit[2193]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.741000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffc7a0d90 a2=0 a3=1 items=0 ppid=2141 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:37:24.742000 audit[2194]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.742000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1825180 a2=0 a3=1 items=0 ppid=2141 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:37:24.744000 audit[2196]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.744000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff1f742e0 a2=0 a3=1 items=0 ppid=2141 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:37:24.747000 audit[2199]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.747000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffccf6df40 a2=0 a3=1 items=0 ppid=2141 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:37:24.748000 audit[2200]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.748000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb7f85f0 a2=0 a3=1 items=0 ppid=2141 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:37:24.751000 audit[2202]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.751000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe8ac6f60 a2=0 a3=1 items=0 ppid=2141 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:37:24.752000 audit[2203]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.752000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff19fb030 a2=0 a3=1 items=0 ppid=2141 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:37:24.754000 audit[2205]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.754000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee4dcfd0 a2=0 a3=1 items=0 ppid=2141 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:37:24.757000 audit[2208]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.757000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe744a400 a2=0 a3=1 items=0 ppid=2141 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:37:24.760000 audit[2211]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.760000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff666e6d0 a2=0 a3=1 items=0 ppid=2141 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:37:24.761000 audit[2212]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.761000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff250e9f0 a2=0 a3=1 items=0 ppid=2141 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:37:24.763000 audit[2214]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.763000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffef5f0a50 a2=0 a3=1 items=0 ppid=2141 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:37:24.830000 audit[2219]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.830000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd3870e60 a2=0 a3=1 items=0 ppid=2141 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:37:24.836000 audit[2224]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.836000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9a5bdc0 a2=0 a3=1 items=0 ppid=2141 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:37:24.838000 audit[2226]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:37:24.838000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcb49e520 a2=0 a3=1 items=0 ppid=2141 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:37:24.852081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2150849041.mount: Deactivated successfully. Apr 12 18:37:24.868000 audit[2228]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:24.868000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffde2dd230 a2=0 a3=1 items=0 ppid=2141 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:24.923000 audit[2228]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:24.923000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffde2dd230 a2=0 a3=1 items=0 ppid=2141 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:24.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:25.014000 audit[2236]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.014000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcac0f9f0 a2=0 a3=1 items=0 ppid=2141 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:37:25.017000 audit[2238]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.017000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd65a13b0 a2=0 a3=1 items=0 ppid=2141 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:37:25.020000 audit[2241]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.020000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffc9b1ec0 a2=0 a3=1 items=0 ppid=2141 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:37:25.021000 audit[2242]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.021000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffebf0d90 a2=0 a3=1 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:37:25.023000 audit[2244]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.023000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb679a80 a2=0 a3=1 items=0 ppid=2141 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:37:25.024000 audit[2245]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.024000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe21e6450 a2=0 a3=1 items=0 ppid=2141 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:37:25.027000 audit[2247]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.027000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdfea0040 a2=0 a3=1 items=0 ppid=2141 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:37:25.030000 audit[2250]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.030000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffca90c640 a2=0 a3=1 items=0 ppid=2141 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:37:25.031000 audit[2251]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.031000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff314d1b0 a2=0 a3=1 items=0 ppid=2141 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:37:25.033000 audit[2253]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.033000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc743b710 a2=0 a3=1 items=0 ppid=2141 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:37:25.034000 audit[2254]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.034000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9e22930 a2=0 a3=1 items=0 ppid=2141 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:37:25.036000 audit[2256]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.036000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc1698f40 a2=0 a3=1 items=0 ppid=2141 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:37:25.039000 audit[2259]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.039000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffefbbc7c0 a2=0 a3=1 items=0 ppid=2141 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:37:25.042000 audit[2262]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.042000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6d36530 a2=0 a3=1 items=0 ppid=2141 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:37:25.043000 audit[2263]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.043000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffd25bd70 a2=0 a3=1 items=0 ppid=2141 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:37:25.045000 audit[2265]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.045000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcf4a2bb0 a2=0 a3=1 items=0 ppid=2141 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:37:25.048000 audit[2268]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.048000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffce807380 a2=0 a3=1 items=0 ppid=2141 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:37:25.049000 audit[2269]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.049000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaf1d380 a2=0 a3=1 items=0 ppid=2141 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:37:25.051000 audit[2271]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.051000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffffe284d0 a2=0 a3=1 items=0 ppid=2141 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:37:25.053000 audit[2274]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.053000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff4627150 a2=0 a3=1 items=0 ppid=2141 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:37:25.054000 audit[2275]: NETFILTER_CFG table=nat:64 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.054000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd32e2f60 a2=0 a3=1 items=0 ppid=2141 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:37:25.057000 audit[2277]: NETFILTER_CFG table=nat:65 family=10 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:37:25.057000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd1983a20 a2=0 a3=1 items=0 ppid=2141 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:37:25.060000 audit[2279]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:37:25.060000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffffcbca800 a2=0 a3=1 items=0 ppid=2141 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.060000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:25.060000 audit[2279]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:37:25.060000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffffcbca800 a2=0 a3=1 items=0 ppid=2141 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:25.060000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:25.299425 kubelet[1917]: E0412 18:37:25.299386 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:25.378610 kubelet[1917]: E0412 18:37:25.378274 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:25.770097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2219370623.mount: Deactivated successfully. Apr 12 18:37:26.299997 kubelet[1917]: E0412 18:37:26.299967 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:27.300957 kubelet[1917]: E0412 18:37:27.300926 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:27.379372 kubelet[1917]: E0412 18:37:27.379068 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:28.301341 kubelet[1917]: E0412 18:37:28.301294 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:28.939471 env[1334]: time="2024-04-12T18:37:28.939414758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:28.945400 env[1334]: time="2024-04-12T18:37:28.945358438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:28.948272 env[1334]: time="2024-04-12T18:37:28.948239319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:28.952455 env[1334]: time="2024-04-12T18:37:28.952426119Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:28.952794 env[1334]: time="2024-04-12T18:37:28.952770799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:37:28.955091 env[1334]: time="2024-04-12T18:37:28.955057239Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:37:28.975525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751871554.mount: Deactivated successfully. Apr 12 18:37:28.988839 env[1334]: time="2024-04-12T18:37:28.988785720Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a\"" Apr 12 18:37:28.989328 env[1334]: time="2024-04-12T18:37:28.989304680Z" level=info msg="StartContainer for \"0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a\"" Apr 12 18:37:29.010986 systemd[1]: Started cri-containerd-0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a.scope. Apr 12 18:37:29.047398 kernel: kauditd_printk_skb: 348 callbacks suppressed Apr 12 18:37:29.047532 kernel: audit: type=1400 audit(1712947049.024:655): avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1979 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.075818 kernel: audit: type=1300 audit(1712947049.024:655): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1979 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393161373237643739633864633966666338646236366363346534 Apr 12 18:37:29.102497 kernel: audit: type=1327 audit(1712947049.024:655): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393161373237643739633864633966666338646236366363346534 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.120034 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.120153 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.123514 env[1334]: time="2024-04-12T18:37:29.123470405Z" level=info msg="StartContainer for \"0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a\" returns successfully" Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.153842 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.153957 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.188206 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.188328 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.222129 kernel: audit: type=1400 audit(1712947049.024:656): avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.024000 audit: BPF prog-id=79 op=LOAD Apr 12 18:37:29.024000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1979 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393161373237643739633864633966666338646236366363346534 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.029000 audit: BPF prog-id=80 op=LOAD Apr 12 18:37:29.029000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1979 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393161373237643739633864633966666338646236366363346534 Apr 12 18:37:29.046000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:37:29.046000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:29.046000 audit: BPF prog-id=81 op=LOAD Apr 12 18:37:29.046000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1979 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393161373237643739633864633966666338646236366363346534 Apr 12 18:37:29.302031 kubelet[1917]: E0412 18:37:29.301981 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:29.380145 kubelet[1917]: E0412 18:37:29.380112 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:29.429182 kubelet[1917]: I0412 18:37:29.429146 1917 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-blgl9" podStartSLOduration=10.109522993 podCreationTimestamp="2024-04-12 18:37:16 +0000 UTC" firstStartedPulling="2024-04-12 18:37:21.167429117 +0000 UTC m=+6.359217074" lastFinishedPulling="2024-04-12 18:37:24.486991621 +0000 UTC m=+9.678779658" observedRunningTime="2024-04-12 18:37:25.405692499 +0000 UTC m=+10.597480456" watchObservedRunningTime="2024-04-12 18:37:29.429085577 +0000 UTC m=+14.620873494" Apr 12 18:37:29.973168 systemd[1]: run-containerd-runc-k8s.io-0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a-runc.SMiS6P.mount: Deactivated successfully. Apr 12 18:37:30.098736 env[1334]: time="2024-04-12T18:37:30.098667401Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:37:30.101437 systemd[1]: cri-containerd-0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a.scope: Deactivated successfully. Apr 12 18:37:30.104000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:37:30.120708 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a-rootfs.mount: Deactivated successfully. Apr 12 18:37:30.164861 kubelet[1917]: I0412 18:37:30.164826 1917 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:37:30.302328 kubelet[1917]: E0412 18:37:30.302201 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:31.302490 kubelet[1917]: E0412 18:37:31.302432 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:31.385531 systemd[1]: Created slice kubepods-besteffort-pod68bdb281_9a58_4c5a_9cd8_d1da00950aca.slice. Apr 12 18:37:31.391198 env[1334]: time="2024-04-12T18:37:31.391155448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zshnt,Uid:68bdb281-9a58-4c5a-9cd8-d1da00950aca,Namespace:calico-system,Attempt:0,}" Apr 12 18:37:31.733771 env[1334]: time="2024-04-12T18:37:31.733722660Z" level=info msg="shim disconnected" id=0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a Apr 12 18:37:31.733771 env[1334]: time="2024-04-12T18:37:31.733766180Z" level=warning msg="cleaning up after shim disconnected" id=0791a727d79c8dc9ffc8db66cc4e408ba52f120f43ddcfa271be32332d9fed0a namespace=k8s.io Apr 12 18:37:31.733771 env[1334]: time="2024-04-12T18:37:31.733775020Z" level=info msg="cleaning up dead shim" Apr 12 18:37:31.747841 env[1334]: time="2024-04-12T18:37:31.743956061Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:37:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2329 runtime=io.containerd.runc.v2\n" Apr 12 18:37:31.794222 env[1334]: time="2024-04-12T18:37:31.794155022Z" level=error msg="Failed to destroy network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:37:31.796079 env[1334]: time="2024-04-12T18:37:31.796035222Z" level=error msg="encountered an error cleaning up failed sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:37:31.796233 env[1334]: time="2024-04-12T18:37:31.796208142Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zshnt,Uid:68bdb281-9a58-4c5a-9cd8-d1da00950aca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:37:31.796807 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51-shm.mount: Deactivated successfully. Apr 12 18:37:31.797697 kubelet[1917]: E0412 18:37:31.797662 1917 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:37:31.797766 kubelet[1917]: E0412 18:37:31.797732 1917 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:31.797766 kubelet[1917]: E0412 18:37:31.797763 1917 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zshnt" Apr 12 18:37:31.797838 kubelet[1917]: E0412 18:37:31.797812 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zshnt_calico-system(68bdb281-9a58-4c5a-9cd8-d1da00950aca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zshnt_calico-system(68bdb281-9a58-4c5a-9cd8-d1da00950aca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:32.302716 kubelet[1917]: E0412 18:37:32.302683 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:32.408884 env[1334]: time="2024-04-12T18:37:32.408847124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:37:32.409871 kubelet[1917]: I0412 18:37:32.409840 1917 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:32.410438 env[1334]: time="2024-04-12T18:37:32.410345724Z" level=info msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" Apr 12 18:37:32.434723 env[1334]: time="2024-04-12T18:37:32.434666645Z" level=error msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" failed" error="failed to destroy network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:37:32.434991 kubelet[1917]: E0412 18:37:32.434969 1917 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:32.435052 kubelet[1917]: E0412 18:37:32.435023 1917 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51} Apr 12 18:37:32.435099 kubelet[1917]: E0412 18:37:32.435068 1917 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:37:32.435099 kubelet[1917]: E0412 18:37:32.435098 1917 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68bdb281-9a58-4c5a-9cd8-d1da00950aca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zshnt" podUID=68bdb281-9a58-4c5a-9cd8-d1da00950aca Apr 12 18:37:33.303620 kubelet[1917]: E0412 18:37:33.303578 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:34.303909 kubelet[1917]: E0412 18:37:34.303865 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:35.293019 kubelet[1917]: E0412 18:37:35.292977 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:35.304142 kubelet[1917]: E0412 18:37:35.304114 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:36.304266 kubelet[1917]: E0412 18:37:36.304223 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:37.269961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2585924337.mount: Deactivated successfully. Apr 12 18:37:37.305138 kubelet[1917]: E0412 18:37:37.305068 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:37.420537 env[1334]: time="2024-04-12T18:37:37.420498489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:37.427345 env[1334]: time="2024-04-12T18:37:37.427307929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:37.430816 env[1334]: time="2024-04-12T18:37:37.430787610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:37.433954 env[1334]: time="2024-04-12T18:37:37.433926170Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:37.434347 env[1334]: time="2024-04-12T18:37:37.434315970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:37:37.446645 env[1334]: time="2024-04-12T18:37:37.446601650Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:37:37.479135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount811451116.mount: Deactivated successfully. Apr 12 18:37:37.495047 env[1334]: time="2024-04-12T18:37:37.494978892Z" level=info msg="CreateContainer within sandbox \"ee3f3c7de14dd4b147e92f0a825779ff4b05146f280a4f0bc06f30df260e2c84\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a\"" Apr 12 18:37:37.495870 env[1334]: time="2024-04-12T18:37:37.495848972Z" level=info msg="StartContainer for \"987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a\"" Apr 12 18:37:37.510486 systemd[1]: Started cri-containerd-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a.scope. Apr 12 18:37:37.548825 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:37:37.548974 kernel: audit: type=1400 audit(1712947057.526:662): avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1979 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373333326339613161353835616438623937303836386234633838 Apr 12 18:37:37.575985 kernel: audit: type=1300 audit(1712947057.526:662): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1979 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.617365 kernel: audit: type=1327 audit(1712947057.526:662): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373333326339613161353835616438623937303836386234633838 Apr 12 18:37:37.617471 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.617494 env[1334]: time="2024-04-12T18:37:37.607824855Z" level=info msg="StartContainer for \"987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a\" returns successfully" Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.635012 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.651705 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.685462 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.685559 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.701824 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.718376 kernel: audit: type=1400 audit(1712947057.526:663): avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.526000 audit: BPF prog-id=82 op=LOAD Apr 12 18:37:37.526000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1979 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373333326339613161353835616438623937303836386234633838 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.531000 audit: BPF prog-id=83 op=LOAD Apr 12 18:37:37.531000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1979 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:37.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373333326339613161353835616438623937303836386234633838 Apr 12 18:37:37.547000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:37:37.547000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:37.548000 audit: BPF prog-id=84 op=LOAD Apr 12 18:37:37.548000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1979 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:37.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373333326339613161353835616438623937303836386234633838 Apr 12 18:37:37.749450 kubelet[1917]: I0412 18:37:37.748608 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:37:37.753535 systemd[1]: Created slice kubepods-besteffort-pod20b34871_7390_4a9b_9126_89561900ef76.slice. Apr 12 18:37:37.851799 kubelet[1917]: I0412 18:37:37.851699 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ghmqx\" (UniqueName: \"kubernetes.io/projected/20b34871-7390-4a9b-9126-89561900ef76-kube-api-access-ghmqx\") pod \"nginx-deployment-845c78c8b9-2gd46\" (UID: \"20b34871-7390-4a9b-9126-89561900ef76\") " pod="default/nginx-deployment-845c78c8b9-2gd46" Apr 12 18:37:37.884236 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:37:37.884364 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:37:38.057101 env[1334]: time="2024-04-12T18:37:38.056930229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-2gd46,Uid:20b34871-7390-4a9b-9126-89561900ef76,Namespace:default,Attempt:0,}" Apr 12 18:37:38.234923 kernel: Initializing XFRM netlink socket Apr 12 18:37:38.244143 systemd-networkd[1486]: calie896e5167ee: Link UP Apr 12 18:37:38.254261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:37:38.254355 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie896e5167ee: link becomes ready Apr 12 18:37:38.255500 systemd-networkd[1486]: calie896e5167ee: Gained carrier Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.126 [INFO][2451] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.141 [INFO][2451] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0 nginx-deployment-845c78c8b9- default 20b34871-7390-4a9b-9126-89561900ef76 1296 0 2024-04-12 18:37:37 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.19 nginx-deployment-845c78c8b9-2gd46 eth0 default [] [] [kns.default ksa.default.default] calie896e5167ee [] []}} ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.141 [INFO][2451] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.163 [INFO][2468] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" HandleID="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Workload="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.176 [INFO][2468] ipam_plugin.go 268: Auto assigning IP ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" HandleID="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Workload="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aa7b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"nginx-deployment-845c78c8b9-2gd46", "timestamp":"2024-04-12 18:37:38.163614752 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.176 [INFO][2468] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.177 [INFO][2468] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.177 [INFO][2468] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.178 [INFO][2468] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.182 [INFO][2468] ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.186 [INFO][2468] ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.187 [INFO][2468] ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.190 [INFO][2468] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.190 [INFO][2468] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.193 [INFO][2468] ipam.go 1682: Creating new handle: k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.196 [INFO][2468] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.201 [INFO][2468] ipam.go 1216: Successfully claimed IPs: [192.168.5.65/26] block=192.168.5.64/26 handle="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.201 [INFO][2468] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.65/26] handle="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" host="10.200.20.19" Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.201 [INFO][2468] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:37:38.262641 env[1334]: 2024-04-12 18:37:38.201 [INFO][2468] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.65/26] IPv6=[] ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" HandleID="k8s-pod-network.09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Workload="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.203 [INFO][2451] k8s.go 385: Populated endpoint ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"20b34871-7390-4a9b-9126-89561900ef76", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-2gd46", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie896e5167ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.203 [INFO][2451] k8s.go 386: Calico CNI using IPs: [192.168.5.65/32] ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.203 [INFO][2451] dataplane_linux.go 68: Setting the host side veth name to calie896e5167ee ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.255 [INFO][2451] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.257 [INFO][2451] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"20b34871-7390-4a9b-9126-89561900ef76", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f", Pod:"nginx-deployment-845c78c8b9-2gd46", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie896e5167ee", MAC:"2a:09:fd:d1:01:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:38.263232 env[1334]: 2024-04-12 18:37:38.261 [INFO][2451] k8s.go 498: Wrote updated endpoint to datastore ContainerID="09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f" Namespace="default" Pod="nginx-deployment-845c78c8b9-2gd46" WorkloadEndpoint="10.200.20.19-k8s-nginx--deployment--845c78c8b9--2gd46-eth0" Apr 12 18:37:38.280845 env[1334]: time="2024-04-12T18:37:38.280778756Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:37:38.281067 env[1334]: time="2024-04-12T18:37:38.281041156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:37:38.281172 env[1334]: time="2024-04-12T18:37:38.281150876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:37:38.281421 env[1334]: time="2024-04-12T18:37:38.281393676Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f pid=2494 runtime=io.containerd.runc.v2 Apr 12 18:37:38.297268 systemd[1]: run-containerd-runc-k8s.io-09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f-runc.lPjSic.mount: Deactivated successfully. Apr 12 18:37:38.301831 systemd[1]: Started cri-containerd-09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f.scope. Apr 12 18:37:38.305319 kubelet[1917]: E0412 18:37:38.305280 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit: BPF prog-id=85 op=LOAD Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2494 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393731663163336131636662366332376534623062326338633031 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2494 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393731663163336131636662366332376534623062326338633031 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit: BPF prog-id=86 op=LOAD Apr 12 18:37:38.312000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2494 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393731663163336131636662366332376534623062326338633031 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.312000 audit: BPF prog-id=87 op=LOAD Apr 12 18:37:38.312000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2494 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393731663163336131636662366332376534623062326338633031 Apr 12 18:37:38.312000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:37:38.313000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:38.313000 audit: BPF prog-id=88 op=LOAD Apr 12 18:37:38.313000 audit[2504]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2494 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393731663163336131636662366332376534623062326338633031 Apr 12 18:37:38.332133 env[1334]: time="2024-04-12T18:37:38.332091477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-2gd46,Uid:20b34871-7390-4a9b-9126-89561900ef76,Namespace:default,Attempt:0,} returns sandbox id \"09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f\"" Apr 12 18:37:38.334321 env[1334]: time="2024-04-12T18:37:38.334283877Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:37:38.433356 kubelet[1917]: I0412 18:37:38.433319 1917 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-vtc86" podStartSLOduration=6.155637146 podCreationTimestamp="2024-04-12 18:37:16 +0000 UTC" firstStartedPulling="2024-04-12 18:37:21.156905476 +0000 UTC m=+6.348693433" lastFinishedPulling="2024-04-12 18:37:37.43454717 +0000 UTC m=+22.626335127" observedRunningTime="2024-04-12 18:37:38.4332538 +0000 UTC m=+23.625041757" watchObservedRunningTime="2024-04-12 18:37:38.43327884 +0000 UTC m=+23.625066797" Apr 12 18:37:39.176000 audit[2608]: AVC avc: denied { write } for pid=2608 comm="tee" name="fd" dev="proc" ino=17873 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.176000 audit[2608]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc58cb986 a2=241 a3=1b6 items=1 ppid=2563 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.176000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:37:39.180000 audit[2619]: AVC avc: denied { write } for pid=2619 comm="tee" name="fd" dev="proc" ino=17880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.180000 audit[2610]: AVC avc: denied { write } for pid=2610 comm="tee" name="fd" dev="proc" ino=18668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.180000 audit[2619]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda12c985 a2=241 a3=1b6 items=1 ppid=2561 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.180000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:37:39.182000 audit[2615]: AVC avc: denied { write } for pid=2615 comm="tee" name="fd" dev="proc" ino=18671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.176000 audit: PATH item=0 name="/dev/fd/63" inode=17860 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.180000 audit[2610]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe811f987 a2=241 a3=1b6 items=1 ppid=2566 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.180000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:37:39.180000 audit: PATH item=0 name="/dev/fd/63" inode=18657 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.180000 audit: PATH item=0 name="/dev/fd/63" inode=17870 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.187000 audit[2623]: AVC avc: denied { write } for pid=2623 comm="tee" name="fd" dev="proc" ino=18676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.182000 audit[2615]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca963976 a2=241 a3=1b6 items=1 ppid=2570 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.182000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:37:39.182000 audit: PATH item=0 name="/dev/fd/63" inode=18662 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.187000 audit[2623]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf42e975 a2=241 a3=1b6 items=1 ppid=2565 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.187000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:37:39.187000 audit: PATH item=0 name="/dev/fd/63" inode=17875 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.187000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.195000 audit[2627]: AVC avc: denied { write } for pid=2627 comm="tee" name="fd" dev="proc" ino=17887 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.195000 audit[2627]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf28b985 a2=241 a3=1b6 items=1 ppid=2558 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.195000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:37:39.195000 audit: PATH item=0 name="/dev/fd/63" inode=17884 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.195000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.202000 audit[2629]: AVC avc: denied { write } for pid=2629 comm="tee" name="fd" dev="proc" ino=18681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:37:39.202000 audit[2629]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc98eb985 a2=241 a3=1b6 items=1 ppid=2557 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.202000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:37:39.202000 audit: PATH item=0 name="/dev/fd/63" inode=18673 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:37:39.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:37:39.306352 kubelet[1917]: E0412 18:37:39.306312 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:39.510079 systemd[1]: run-containerd-runc-k8s.io-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a-runc.8tjZEd.mount: Deactivated successfully. Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit: BPF prog-id=89 op=LOAD Apr 12 18:37:39.612000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc8cbe958 a2=70 a3=ffffc8cbe9c8 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.612000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.612000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit: BPF prog-id=90 op=LOAD Apr 12 18:37:39.612000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc8cbe958 a2=70 a3=4b243c items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.612000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.612000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc8cbe910 a2=70 a3=ffffc8cbe980 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.612000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.612000 audit: BPF prog-id=91 op=LOAD Apr 12 18:37:39.612000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc8cbe8f8 a2=70 a3=ffffc8cbe968 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.612000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.613000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:37:39.613000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.613000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc8cbe9c8 a2=70 a3=0 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.613000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.613000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.613000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc8cbe9b8 a2=70 a3=0 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.613000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.614000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.614000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc8cbe928 a2=70 a3=0 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.614000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.614000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.614000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc8cbea00 a2=70 a3=1d0d99ef items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.614000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.614000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.614000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc8cbea00 a2=70 a3=1d0d99ef items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.614000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.617000 audit: BPF prog-id=92 op=LOAD Apr 12 18:37:39.617000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc8cbe928 a2=70 a3=1d0d9a09 items=0 ppid=2560 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.617000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:37:39.620000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.620000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff09b83e8 a2=70 a3=fffff09b8458 items=0 ppid=2560 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.620000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:37:39.623000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:39.623000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff09b82b8 a2=70 a3=fffff09b8328 items=0 ppid=2560 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:39.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:37:39.629000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:37:39.789053 systemd-networkd[1486]: calie896e5167ee: Gained IPv6LL Apr 12 18:37:40.306697 kubelet[1917]: E0412 18:37:40.306649 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:40.371000 audit[2749]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:40.371000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd479e680 a2=0 a3=ffff81362fa8 items=0 ppid=2560 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:40.371000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:40.395000 audit[2751]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:40.395000 audit[2751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffea55d5e0 a2=0 a3=ffff88860fa8 items=0 ppid=2560 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:40.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:40.399000 audit[2752]: NETFILTER_CFG table=filter:70 family=2 entries=71 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:40.399000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=37628 a0=3 a1=ffffdd825cc0 a2=0 a3=ffffa813cfa8 items=0 ppid=2560 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:40.399000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:40.486248 systemd-networkd[1486]: vxlan.calico: Link UP Apr 12 18:37:40.486254 systemd-networkd[1486]: vxlan.calico: Gained carrier Apr 12 18:37:40.558000 audit[2750]: NETFILTER_CFG table=raw:71 family=2 entries=19 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:40.558000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc321f710 a2=0 a3=ffff9e18cfa8 items=0 ppid=2560 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:40.558000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:41.307108 kubelet[1917]: E0412 18:37:41.307068 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:41.660502 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount504815432.mount: Deactivated successfully. Apr 12 18:37:42.157067 systemd-networkd[1486]: vxlan.calico: Gained IPv6LL Apr 12 18:37:42.307938 kubelet[1917]: E0412 18:37:42.307872 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:42.565700 env[1334]: time="2024-04-12T18:37:42.565587722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:42.571882 env[1334]: time="2024-04-12T18:37:42.571831922Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:42.576985 env[1334]: time="2024-04-12T18:37:42.576945122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:42.581000 env[1334]: time="2024-04-12T18:37:42.580961202Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:42.581661 env[1334]: time="2024-04-12T18:37:42.581632322Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:37:42.583606 env[1334]: time="2024-04-12T18:37:42.583569682Z" level=info msg="CreateContainer within sandbox \"09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:37:42.612031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount86968184.mount: Deactivated successfully. Apr 12 18:37:42.617716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1351763504.mount: Deactivated successfully. Apr 12 18:37:42.634339 env[1334]: time="2024-04-12T18:37:42.634283283Z" level=info msg="CreateContainer within sandbox \"09971f1c3a1cfb6c27e4b0b2c8c012362293da7efa7d3085c065c35432a5705f\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7eb5bcd0163b72f999f6a93598c3a8ed0b75898b1b6682753eb1c836a2595541\"" Apr 12 18:37:42.635065 env[1334]: time="2024-04-12T18:37:42.635033603Z" level=info msg="StartContainer for \"7eb5bcd0163b72f999f6a93598c3a8ed0b75898b1b6682753eb1c836a2595541\"" Apr 12 18:37:42.653505 systemd[1]: Started cri-containerd-7eb5bcd0163b72f999f6a93598c3a8ed0b75898b1b6682753eb1c836a2595541.scope. Apr 12 18:37:42.673053 kernel: kauditd_printk_skb: 214 callbacks suppressed Apr 12 18:37:42.673191 kernel: audit: type=1400 audit(1712947062.665:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.705343 kernel: audit: type=1400 audit(1712947062.665:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.705472 kernel: audit: type=1400 audit(1712947062.665:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.738821 kernel: audit: type=1400 audit(1712947062.665:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.739015 kernel: audit: type=1400 audit(1712947062.665:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.774479 kernel: audit: type=1400 audit(1712947062.665:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.774633 kernel: audit: type=1400 audit(1712947062.665:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.811934 kernel: audit: type=1400 audit(1712947062.666:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.812047 kernel: audit: type=1400 audit(1712947062.666:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.850813 kernel: audit: type=1400 audit(1712947062.666:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.666000 audit: BPF prog-id=93 op=LOAD Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2494 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:42.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623562636430313633623732663939396636613933353938633361 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2494 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:42.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623562636430313633623732663939396636613933353938633361 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit: BPF prog-id=94 op=LOAD Apr 12 18:37:42.687000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2494 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:42.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623562636430313633623732663939396636613933353938633361 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit: BPF prog-id=95 op=LOAD Apr 12 18:37:42.687000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2494 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:42.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623562636430313633623732663939396636613933353938633361 Apr 12 18:37:42.687000 audit: BPF prog-id=95 op=UNLOAD Apr 12 18:37:42.687000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:42.687000 audit: BPF prog-id=96 op=LOAD Apr 12 18:37:42.687000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2494 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:42.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765623562636430313633623732663939396636613933353938633361 Apr 12 18:37:42.854030 env[1334]: time="2024-04-12T18:37:42.853974610Z" level=info msg="StartContainer for \"7eb5bcd0163b72f999f6a93598c3a8ed0b75898b1b6682753eb1c836a2595541\" returns successfully" Apr 12 18:37:43.308521 kubelet[1917]: E0412 18:37:43.308486 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:43.441127 kubelet[1917]: I0412 18:37:43.441090 1917 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-2gd46" podStartSLOduration=2.192771541 podCreationTimestamp="2024-04-12 18:37:37 +0000 UTC" firstStartedPulling="2024-04-12 18:37:38.333686037 +0000 UTC m=+23.525473994" lastFinishedPulling="2024-04-12 18:37:42.581961122 +0000 UTC m=+27.773749079" observedRunningTime="2024-04-12 18:37:43.440652586 +0000 UTC m=+28.632440503" watchObservedRunningTime="2024-04-12 18:37:43.441046626 +0000 UTC m=+28.632834583" Apr 12 18:37:44.309527 kubelet[1917]: E0412 18:37:44.309486 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:45.310631 kubelet[1917]: E0412 18:37:45.310596 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:45.381692 env[1334]: time="2024-04-12T18:37:45.381148718Z" level=info msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.436 [INFO][2837] k8s.go 585: Cleaning up netns ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.436 [INFO][2837] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" iface="eth0" netns="/var/run/netns/cni-b88cd1c4-e863-fa07-6dff-f511701dff1d" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.437 [INFO][2837] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" iface="eth0" netns="/var/run/netns/cni-b88cd1c4-e863-fa07-6dff-f511701dff1d" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.437 [INFO][2837] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" iface="eth0" netns="/var/run/netns/cni-b88cd1c4-e863-fa07-6dff-f511701dff1d" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.437 [INFO][2837] k8s.go 592: Releasing IP address(es) ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.437 [INFO][2837] utils.go 188: Calico CNI releasing IP address ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.458 [INFO][2847] ipam_plugin.go 415: Releasing address using handleID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.458 [INFO][2847] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.458 [INFO][2847] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.472 [WARNING][2847] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.472 [INFO][2847] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.474 [INFO][2847] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:37:45.477189 env[1334]: 2024-04-12 18:37:45.475 [INFO][2837] k8s.go 598: Teardown processing complete. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:37:45.478733 systemd[1]: run-netns-cni\x2db88cd1c4\x2de863\x2dfa07\x2d6dff\x2df511701dff1d.mount: Deactivated successfully. Apr 12 18:37:45.480161 env[1334]: time="2024-04-12T18:37:45.480112721Z" level=info msg="TearDown network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" successfully" Apr 12 18:37:45.480248 env[1334]: time="2024-04-12T18:37:45.480231521Z" level=info msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" returns successfully" Apr 12 18:37:45.481041 env[1334]: time="2024-04-12T18:37:45.481013361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zshnt,Uid:68bdb281-9a58-4c5a-9cd8-d1da00950aca,Namespace:calico-system,Attempt:1,}" Apr 12 18:37:46.310758 kubelet[1917]: E0412 18:37:46.310711 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:46.432677 systemd-networkd[1486]: cali18ec2c92485: Link UP Apr 12 18:37:46.445007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:37:46.445217 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali18ec2c92485: link becomes ready Apr 12 18:37:46.446218 systemd-networkd[1486]: cali18ec2c92485: Gained carrier Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.371 [INFO][2855] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-csi--node--driver--zshnt-eth0 csi-node-driver- calico-system 68bdb281-9a58-4c5a-9cd8-d1da00950aca 1336 0 2024-04-12 18:37:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.19 csi-node-driver-zshnt eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali18ec2c92485 [] []}} ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.371 [INFO][2855] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.396 [INFO][2869] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" HandleID="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.407 [INFO][2869] ipam_plugin.go 268: Auto assigning IP ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" HandleID="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000273860), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.19", "pod":"csi-node-driver-zshnt", "timestamp":"2024-04-12 18:37:46.396210745 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.407 [INFO][2869] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.408 [INFO][2869] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.408 [INFO][2869] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.409 [INFO][2869] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.412 [INFO][2869] ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.416 [INFO][2869] ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.418 [INFO][2869] ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.420 [INFO][2869] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.420 [INFO][2869] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.421 [INFO][2869] ipam.go 1682: Creating new handle: k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3 Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.424 [INFO][2869] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.428 [INFO][2869] ipam.go 1216: Successfully claimed IPs: [192.168.5.66/26] block=192.168.5.64/26 handle="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.428 [INFO][2869] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.66/26] handle="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" host="10.200.20.19" Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.428 [INFO][2869] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:37:46.461335 env[1334]: 2024-04-12 18:37:46.428 [INFO][2869] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.66/26] IPv6=[] ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" HandleID="k8s-pod-network.4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.430 [INFO][2855] k8s.go 385: Populated endpoint ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--zshnt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bdb281-9a58-4c5a-9cd8-d1da00950aca", ResourceVersion:"1336", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"csi-node-driver-zshnt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali18ec2c92485", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.430 [INFO][2855] k8s.go 386: Calico CNI using IPs: [192.168.5.66/32] ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.430 [INFO][2855] dataplane_linux.go 68: Setting the host side veth name to cali18ec2c92485 ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.447 [INFO][2855] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.448 [INFO][2855] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--zshnt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bdb281-9a58-4c5a-9cd8-d1da00950aca", ResourceVersion:"1336", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3", Pod:"csi-node-driver-zshnt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali18ec2c92485", MAC:"ba:18:ef:82:ac:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:46.462142 env[1334]: 2024-04-12 18:37:46.455 [INFO][2855] k8s.go 498: Wrote updated endpoint to datastore ContainerID="4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3" Namespace="calico-system" Pod="csi-node-driver-zshnt" WorkloadEndpoint="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:37:46.479000 audit[2900]: NETFILTER_CFG table=filter:72 family=2 entries=40 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:46.479000 audit[2900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffe85f54a0 a2=0 a3=ffffb77affa8 items=0 ppid=2560 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.479000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:46.481411 env[1334]: time="2024-04-12T18:37:46.481327427Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:37:46.481613 env[1334]: time="2024-04-12T18:37:46.481569467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:37:46.481722 env[1334]: time="2024-04-12T18:37:46.481701347Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:37:46.482147 env[1334]: time="2024-04-12T18:37:46.482101667Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3 pid=2901 runtime=io.containerd.runc.v2 Apr 12 18:37:46.496483 systemd[1]: Started cri-containerd-4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3.scope. Apr 12 18:37:46.500570 systemd[1]: run-containerd-runc-k8s.io-4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3-runc.dApPou.mount: Deactivated successfully. Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit: BPF prog-id=97 op=LOAD Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2901 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363361366662323763323933333831646638636662643363316564 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2901 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363361366662323763323933333831646638636662643363316564 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit: BPF prog-id=98 op=LOAD Apr 12 18:37:46.515000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2901 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363361366662323763323933333831646638636662643363316564 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit: BPF prog-id=99 op=LOAD Apr 12 18:37:46.515000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2901 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363361366662323763323933333831646638636662643363316564 Apr 12 18:37:46.515000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:37:46.515000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:46.515000 audit: BPF prog-id=100 op=LOAD Apr 12 18:37:46.515000 audit[2910]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2901 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462363361366662323763323933333831646638636662643363316564 Apr 12 18:37:46.537173 env[1334]: time="2024-04-12T18:37:46.537112309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zshnt,Uid:68bdb281-9a58-4c5a-9cd8-d1da00950aca,Namespace:calico-system,Attempt:1,} returns sandbox id \"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3\"" Apr 12 18:37:46.539191 env[1334]: time="2024-04-12T18:37:46.539153029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:37:47.065000 audit[2935]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.065000 audit[2935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcaa5e8c0 a2=0 a3=1 items=0 ppid=2141 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.074000 audit[2935]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.074000 audit[2935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcaa5e8c0 a2=0 a3=1 items=0 ppid=2141 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.087000 audit[2939]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.087000 audit[2939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe158fb90 a2=0 a3=1 items=0 ppid=2141 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.088000 audit[2939]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.088000 audit[2939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe158fb90 a2=0 a3=1 items=0 ppid=2141 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.097794 kubelet[1917]: I0412 18:37:47.097114 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:37:47.101870 systemd[1]: Created slice kubepods-besteffort-pod8e884e83_0023_4d9e_8e46_464ee3856c7d.slice. Apr 12 18:37:47.204875 kubelet[1917]: I0412 18:37:47.204763 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r2nrw\" (UniqueName: \"kubernetes.io/projected/8e884e83-0023-4d9e-8e46-464ee3856c7d-kube-api-access-r2nrw\") pod \"nfs-server-provisioner-0\" (UID: \"8e884e83-0023-4d9e-8e46-464ee3856c7d\") " pod="default/nfs-server-provisioner-0" Apr 12 18:37:47.204875 kubelet[1917]: I0412 18:37:47.204817 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8e884e83-0023-4d9e-8e46-464ee3856c7d-data\") pod \"nfs-server-provisioner-0\" (UID: \"8e884e83-0023-4d9e-8e46-464ee3856c7d\") " pod="default/nfs-server-provisioner-0" Apr 12 18:37:47.311172 kubelet[1917]: E0412 18:37:47.311114 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:47.405481 env[1334]: time="2024-04-12T18:37:47.405420331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8e884e83-0023-4d9e-8e46-464ee3856c7d,Namespace:default,Attempt:0,}" Apr 12 18:37:47.588926 systemd-networkd[1486]: cali60e51b789ff: Link UP Apr 12 18:37:47.603632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:37:47.603751 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:37:47.604146 systemd-networkd[1486]: cali60e51b789ff: Gained carrier Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.502 [INFO][2941] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8e884e83-0023-4d9e-8e46-464ee3856c7d 1361 0 2024-04-12 18:37:47 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.19 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.502 [INFO][2941] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.526 [INFO][2953] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" HandleID="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.551 [INFO][2953] ipam_plugin.go 268: Auto assigning IP ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" HandleID="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef5f0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:37:47.526580654 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.551 [INFO][2953] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.551 [INFO][2953] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.551 [INFO][2953] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.552 [INFO][2953] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.556 [INFO][2953] ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.559 [INFO][2953] ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.561 [INFO][2953] ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.565 [INFO][2953] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.565 [INFO][2953] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.568 [INFO][2953] ipam.go 1682: Creating new handle: k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7 Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.572 [INFO][2953] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.577 [INFO][2953] ipam.go 1216: Successfully claimed IPs: [192.168.5.67/26] block=192.168.5.64/26 handle="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.577 [INFO][2953] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.67/26] handle="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" host="10.200.20.19" Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.577 [INFO][2953] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:37:47.613485 env[1334]: 2024-04-12 18:37:47.577 [INFO][2953] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.67/26] IPv6=[] ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" HandleID="k8s-pod-network.c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Workload="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.616881 env[1334]: 2024-04-12 18:37:47.579 [INFO][2941] k8s.go 385: Populated endpoint ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8e884e83-0023-4d9e-8e46-464ee3856c7d", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:47.616881 env[1334]: 2024-04-12 18:37:47.579 [INFO][2941] k8s.go 386: Calico CNI using IPs: [192.168.5.67/32] ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.616881 env[1334]: 2024-04-12 18:37:47.579 [INFO][2941] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.616881 env[1334]: 2024-04-12 18:37:47.604 [INFO][2941] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.617079 env[1334]: 2024-04-12 18:37:47.604 [INFO][2941] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8e884e83-0023-4d9e-8e46-464ee3856c7d", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"96:5c:b8:ad:45:9b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:37:47.617079 env[1334]: 2024-04-12 18:37:47.611 [INFO][2941] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.19-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:37:47.636000 audit[2974]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:37:47.636000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffcfc0c310 a2=0 a3=ffff89c39fa8 items=0 ppid=2560 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:37:47.653944 env[1334]: time="2024-04-12T18:37:47.653442817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:37:47.653944 env[1334]: time="2024-04-12T18:37:47.653479097Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:37:47.653944 env[1334]: time="2024-04-12T18:37:47.653488897Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:37:47.653944 env[1334]: time="2024-04-12T18:37:47.653594817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7 pid=2983 runtime=io.containerd.runc.v2 Apr 12 18:37:47.668375 systemd[1]: Started cri-containerd-c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7.scope. Apr 12 18:37:47.711549 kernel: kauditd_printk_skb: 122 callbacks suppressed Apr 12 18:37:47.711670 kernel: audit: type=1400 audit(1712947067.687:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.728443 kernel: audit: type=1400 audit(1712947067.687:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.745076 kernel: audit: type=1400 audit(1712947067.687:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.762091 kernel: audit: type=1400 audit(1712947067.687:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.778583 kernel: audit: type=1400 audit(1712947067.687:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.796384 kernel: audit: type=1400 audit(1712947067.687:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.813775 kernel: audit: type=1400 audit(1712947067.687:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.831936 kernel: audit: type=1400 audit(1712947067.687:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.832028 env[1334]: time="2024-04-12T18:37:47.815619781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8e884e83-0023-4d9e-8e46-464ee3856c7d,Namespace:default,Attempt:0,} returns sandbox id \"c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7\"" Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.848772 kernel: audit: type=1400 audit(1712947067.687:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.866653 kernel: audit: type=1400 audit(1712947067.687:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.687000 audit: BPF prog-id=101 op=LOAD Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2983 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643632633832623161636438326533366264643038333266373265 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2983 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643632633832623161636438326533366264643038333266373265 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.692000 audit: BPF prog-id=102 op=LOAD Apr 12 18:37:47.692000 audit[2993]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2983 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643632633832623161636438326533366264643038333266373265 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.693000 audit: BPF prog-id=103 op=LOAD Apr 12 18:37:47.693000 audit[2993]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2983 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643632633832623161636438326533366264643038333266373265 Apr 12 18:37:47.726000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:37:47.726000 audit: BPF prog-id=102 op=UNLOAD Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.726000 audit: BPF prog-id=104 op=LOAD Apr 12 18:37:47.726000 audit[2993]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2983 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643632633832623161636438326533366264643038333266373265 Apr 12 18:37:47.888039 env[1334]: time="2024-04-12T18:37:47.887957663Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:47.895982 env[1334]: time="2024-04-12T18:37:47.895929104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:47.900512 env[1334]: time="2024-04-12T18:37:47.900475184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:47.904696 env[1334]: time="2024-04-12T18:37:47.904652784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:47.905069 env[1334]: time="2024-04-12T18:37:47.905032184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:37:47.905814 env[1334]: time="2024-04-12T18:37:47.905783824Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:37:47.907801 env[1334]: time="2024-04-12T18:37:47.907749264Z" level=info msg="CreateContainer within sandbox \"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:37:47.934106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount95369223.mount: Deactivated successfully. Apr 12 18:37:47.949999 env[1334]: time="2024-04-12T18:37:47.949938705Z" level=info msg="CreateContainer within sandbox \"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43966195b77cc222f99dabaf79a011a5e3b955962944cbd17f4b1f3bbb8f1368\"" Apr 12 18:37:47.950982 env[1334]: time="2024-04-12T18:37:47.950946425Z" level=info msg="StartContainer for \"43966195b77cc222f99dabaf79a011a5e3b955962944cbd17f4b1f3bbb8f1368\"" Apr 12 18:37:47.967624 systemd[1]: Started cri-containerd-43966195b77cc222f99dabaf79a011a5e3b955962944cbd17f4b1f3bbb8f1368.scope. Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2901 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433393636313935623737636332323266393964616261663739613031 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit: BPF prog-id=105 op=LOAD Apr 12 18:37:47.983000 audit[3024]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2901 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433393636313935623737636332323266393964616261663739613031 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit: BPF prog-id=106 op=LOAD Apr 12 18:37:47.983000 audit[3024]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2901 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433393636313935623737636332323266393964616261663739613031 Apr 12 18:37:47.983000 audit: BPF prog-id=106 op=UNLOAD Apr 12 18:37:47.983000 audit: BPF prog-id=105 op=UNLOAD Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:47.983000 audit: BPF prog-id=107 op=LOAD Apr 12 18:37:47.983000 audit[3024]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2901 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433393636313935623737636332323266393964616261663739613031 Apr 12 18:37:48.005221 env[1334]: time="2024-04-12T18:37:48.005173226Z" level=info msg="StartContainer for \"43966195b77cc222f99dabaf79a011a5e3b955962944cbd17f4b1f3bbb8f1368\" returns successfully" Apr 12 18:37:48.045062 systemd-networkd[1486]: cali18ec2c92485: Gained IPv6LL Apr 12 18:37:48.311354 kubelet[1917]: E0412 18:37:48.311251 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:49.311599 kubelet[1917]: E0412 18:37:49.311550 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:49.453138 systemd-networkd[1486]: cali60e51b789ff: Gained IPv6LL Apr 12 18:37:50.312659 kubelet[1917]: E0412 18:37:50.312603 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:50.498443 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1516542446.mount: Deactivated successfully. Apr 12 18:37:51.313061 kubelet[1917]: E0412 18:37:51.313021 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:52.313656 kubelet[1917]: E0412 18:37:52.313607 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:52.638857 env[1334]: time="2024-04-12T18:37:52.638806618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:52.647635 env[1334]: time="2024-04-12T18:37:52.647597139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:52.653057 env[1334]: time="2024-04-12T18:37:52.653017459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:52.658687 env[1334]: time="2024-04-12T18:37:52.658659419Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:52.659414 env[1334]: time="2024-04-12T18:37:52.659383619Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 18:37:52.660568 env[1334]: time="2024-04-12T18:37:52.660523939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:37:52.661649 env[1334]: time="2024-04-12T18:37:52.661623579Z" level=info msg="CreateContainer within sandbox \"c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:37:52.692520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1191906860.mount: Deactivated successfully. Apr 12 18:37:52.697160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3548919012.mount: Deactivated successfully. Apr 12 18:37:52.712345 env[1334]: time="2024-04-12T18:37:52.712302220Z" level=info msg="CreateContainer within sandbox \"c2d62c82b1acd82e36bdd0832f72e41fa5e0ccf4d6bb2783e9cd1c0267fc96e7\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"66b94f34beeab95c44c756f4dae2cc3d0cf9c922bc88ec2227a155fe2430609b\"" Apr 12 18:37:52.713315 env[1334]: time="2024-04-12T18:37:52.713284300Z" level=info msg="StartContainer for \"66b94f34beeab95c44c756f4dae2cc3d0cf9c922bc88ec2227a155fe2430609b\"" Apr 12 18:37:52.730307 systemd[1]: Started cri-containerd-66b94f34beeab95c44c756f4dae2cc3d0cf9c922bc88ec2227a155fe2430609b.scope. Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749934 kernel: kauditd_printk_skb: 90 callbacks suppressed Apr 12 18:37:52.750028 kernel: audit: type=1400 audit(1712947072.743:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.784164 kernel: audit: type=1400 audit(1712947072.743:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.784280 kernel: audit: type=1400 audit(1712947072.743:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.819701 kernel: audit: type=1400 audit(1712947072.743:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.837537 kernel: audit: type=1400 audit(1712947072.743:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.854915 kernel: audit: type=1400 audit(1712947072.743:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.872359 kernel: audit: type=1400 audit(1712947072.743:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.889681 kernel: audit: type=1400 audit(1712947072.743:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.907577 kernel: audit: type=1400 audit(1712947072.743:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.923669 kernel: audit: type=1400 audit(1712947072.744:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.923977 env[1334]: time="2024-04-12T18:37:52.923939985Z" level=info msg="StartContainer for \"66b94f34beeab95c44c756f4dae2cc3d0cf9c922bc88ec2227a155fe2430609b\" returns successfully" Apr 12 18:37:52.744000 audit: BPF prog-id=108 op=LOAD Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2983 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:52.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623934663334626565616239356334346337353666346461653263 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2983 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:52.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623934663334626565616239356334346337353666346461653263 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.749000 audit: BPF prog-id=109 op=LOAD Apr 12 18:37:52.749000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2983 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:52.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623934663334626565616239356334346337353666346461653263 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.765000 audit: BPF prog-id=110 op=LOAD Apr 12 18:37:52.765000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2983 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:52.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623934663334626565616239356334346337353666346461653263 Apr 12 18:37:52.766000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:37:52.766000 audit: BPF prog-id=109 op=UNLOAD Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:52.766000 audit: BPF prog-id=111 op=LOAD Apr 12 18:37:52.766000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2983 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:52.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623934663334626565616239356334346337353666346461653263 Apr 12 18:37:52.900000 audit[3100]: AVC avc: denied { search } for pid=3100 comm="rpcbind" name="crypto" dev="proc" ino=19924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:37:52.900000 audit[3100]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaf03f000 a2=0 a3=0 items=0 ppid=3082 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 key=(null) Apr 12 18:37:52.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:37:52.949000 audit[3105]: AVC avc: denied { search } for pid=3105 comm="dbus-daemon" name="crypto" dev="proc" ino=19924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:37:52.949000 audit[3105]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff927ff000 a2=0 a3=0 items=0 ppid=3082 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 key=(null) Apr 12 18:37:52.949000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:37:52.953000 audit[3106]: AVC avc: denied { watch } for pid=3106 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c847 tclass=dir permissive=0 Apr 12 18:37:52.953000 audit[3106]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae941eaf0 a2=2c8 a3=aaaae93ffa60 items=0 ppid=3082 pid=3106 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 key=(null) Apr 12 18:37:52.953000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:37:52.959000 audit[3107]: AVC avc: denied { read } for pid=3107 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20020 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:37:52.959000 audit[3107]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffaba9a570 a2=80000 a3=0 items=0 ppid=3082 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 key=(null) Apr 12 18:37:52.959000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:37:52.960000 audit[3107]: AVC avc: denied { search } for pid=3107 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:37:52.960000 audit[3107]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaae2f000 a2=0 a3=0 items=0 ppid=3082 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c847 key=(null) Apr 12 18:37:52.960000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:37:53.314927 kubelet[1917]: E0412 18:37:53.314222 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:53.479741 kubelet[1917]: I0412 18:37:53.479709 1917 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.669783161 podCreationTimestamp="2024-04-12 18:37:47 +0000 UTC" firstStartedPulling="2024-04-12 18:37:47.849840102 +0000 UTC m=+33.041628059" lastFinishedPulling="2024-04-12 18:37:52.659728819 +0000 UTC m=+37.851516776" observedRunningTime="2024-04-12 18:37:53.478654358 +0000 UTC m=+38.670442315" watchObservedRunningTime="2024-04-12 18:37:53.479671878 +0000 UTC m=+38.671459835" Apr 12 18:37:53.491000 audit[3112]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.491000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe793c9f0 a2=0 a3=1 items=0 ppid=2141 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:53.493000 audit[3112]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.493000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe793c9f0 a2=0 a3=1 items=0 ppid=2141 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:53.984702 env[1334]: time="2024-04-12T18:37:53.984637129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:53.992014 env[1334]: time="2024-04-12T18:37:53.991964289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:53.996192 env[1334]: time="2024-04-12T18:37:53.996162409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:54.001692 env[1334]: time="2024-04-12T18:37:54.001664450Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:37:54.001985 env[1334]: time="2024-04-12T18:37:54.001955410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:37:54.004169 env[1334]: time="2024-04-12T18:37:54.004136690Z" level=info msg="CreateContainer within sandbox \"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:37:54.033405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3936168136.mount: Deactivated successfully. Apr 12 18:37:54.053020 env[1334]: time="2024-04-12T18:37:54.052969171Z" level=info msg="CreateContainer within sandbox \"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"772fb9a315b1fe9f1a03c8fe1c7604193c3011154de8ff1866c2551996d2900b\"" Apr 12 18:37:54.053855 env[1334]: time="2024-04-12T18:37:54.053828971Z" level=info msg="StartContainer for \"772fb9a315b1fe9f1a03c8fe1c7604193c3011154de8ff1866c2551996d2900b\"" Apr 12 18:37:54.073362 systemd[1]: Started cri-containerd-772fb9a315b1fe9f1a03c8fe1c7604193c3011154de8ff1866c2551996d2900b.scope. Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2901 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326662396133313562316665396631613033633866653163373630 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit: BPF prog-id=112 op=LOAD Apr 12 18:37:54.093000 audit[3122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2901 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326662396133313562316665396631613033633866653163373630 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit: BPF prog-id=113 op=LOAD Apr 12 18:37:54.093000 audit[3122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2901 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326662396133313562316665396631613033633866653163373630 Apr 12 18:37:54.093000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:37:54.093000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:37:54.093000 audit: BPF prog-id=114 op=LOAD Apr 12 18:37:54.093000 audit[3122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2901 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326662396133313562316665396631613033633866653163373630 Apr 12 18:37:54.117330 env[1334]: time="2024-04-12T18:37:54.117260372Z" level=info msg="StartContainer for \"772fb9a315b1fe9f1a03c8fe1c7604193c3011154de8ff1866c2551996d2900b\" returns successfully" Apr 12 18:37:54.314586 kubelet[1917]: E0412 18:37:54.314492 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:54.389910 kubelet[1917]: I0412 18:37:54.389830 1917 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:37:54.389910 kubelet[1917]: I0412 18:37:54.389867 1917 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:37:54.483567 kubelet[1917]: I0412 18:37:54.483543 1917 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-zshnt" podStartSLOduration=31.020046439 podCreationTimestamp="2024-04-12 18:37:16 +0000 UTC" firstStartedPulling="2024-04-12 18:37:46.538729109 +0000 UTC m=+31.730517066" lastFinishedPulling="2024-04-12 18:37:54.00218517 +0000 UTC m=+39.193973127" observedRunningTime="2024-04-12 18:37:54.48236042 +0000 UTC m=+39.674148377" watchObservedRunningTime="2024-04-12 18:37:54.4835025 +0000 UTC m=+39.675290457" Apr 12 18:37:54.689996 systemd[1]: run-containerd-runc-k8s.io-772fb9a315b1fe9f1a03c8fe1c7604193c3011154de8ff1866c2551996d2900b-runc.yqTkIh.mount: Deactivated successfully. Apr 12 18:37:55.292124 kubelet[1917]: E0412 18:37:55.292082 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:55.315244 kubelet[1917]: E0412 18:37:55.315221 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:56.315806 kubelet[1917]: E0412 18:37:56.315766 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:57.316655 kubelet[1917]: E0412 18:37:57.316619 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:58.317659 kubelet[1917]: E0412 18:37:58.317623 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:37:59.318556 kubelet[1917]: E0412 18:37:59.318507 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:00.319115 kubelet[1917]: E0412 18:38:00.319081 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:01.319919 kubelet[1917]: E0412 18:38:01.319850 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:02.320474 kubelet[1917]: E0412 18:38:02.320442 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:03.321241 kubelet[1917]: E0412 18:38:03.321211 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:04.322643 kubelet[1917]: E0412 18:38:04.322611 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:05.323624 kubelet[1917]: E0412 18:38:05.323589 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:06.324526 kubelet[1917]: E0412 18:38:06.324497 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:07.325197 kubelet[1917]: E0412 18:38:07.325169 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:08.032442 systemd[1]: run-containerd-runc-k8s.io-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a-runc.t7FseJ.mount: Deactivated successfully. Apr 12 18:38:08.326212 kubelet[1917]: E0412 18:38:08.326009 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:09.326861 kubelet[1917]: E0412 18:38:09.326826 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:10.327862 kubelet[1917]: E0412 18:38:10.327802 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:11.328731 kubelet[1917]: E0412 18:38:11.328699 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:12.329809 kubelet[1917]: E0412 18:38:12.329762 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:13.330542 kubelet[1917]: E0412 18:38:13.330510 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:14.331075 kubelet[1917]: E0412 18:38:14.331046 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:15.293092 kubelet[1917]: E0412 18:38:15.293048 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:15.299706 env[1334]: time="2024-04-12T18:38:15.299673340Z" level=info msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" Apr 12 18:38:15.331833 kubelet[1917]: E0412 18:38:15.331797 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.334 [WARNING][3221] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--zshnt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bdb281-9a58-4c5a-9cd8-d1da00950aca", ResourceVersion:"1408", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3", Pod:"csi-node-driver-zshnt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali18ec2c92485", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.334 [INFO][3221] k8s.go 585: Cleaning up netns ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.334 [INFO][3221] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" iface="eth0" netns="" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.334 [INFO][3221] k8s.go 592: Releasing IP address(es) ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.334 [INFO][3221] utils.go 188: Calico CNI releasing IP address ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.350 [INFO][3228] ipam_plugin.go 415: Releasing address using handleID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.350 [INFO][3228] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.350 [INFO][3228] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.360 [WARNING][3228] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.360 [INFO][3228] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.361 [INFO][3228] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:38:15.363255 env[1334]: 2024-04-12 18:38:15.362 [INFO][3221] k8s.go 598: Teardown processing complete. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.363738 env[1334]: time="2024-04-12T18:38:15.363697381Z" level=info msg="TearDown network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" successfully" Apr 12 18:38:15.363807 env[1334]: time="2024-04-12T18:38:15.363792261Z" level=info msg="StopPodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" returns successfully" Apr 12 18:38:15.364426 env[1334]: time="2024-04-12T18:38:15.364395421Z" level=info msg="RemovePodSandbox for \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" Apr 12 18:38:15.364501 env[1334]: time="2024-04-12T18:38:15.364433061Z" level=info msg="Forcibly stopping sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\"" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.403 [WARNING][3246] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-csi--node--driver--zshnt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bdb281-9a58-4c5a-9cd8-d1da00950aca", ResourceVersion:"1408", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"4b63a6fb27c293381df8cfbd3c1ed762244195bdbd40adcf812d8caca0cef1c3", Pod:"csi-node-driver-zshnt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali18ec2c92485", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.404 [INFO][3246] k8s.go 585: Cleaning up netns ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.404 [INFO][3246] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" iface="eth0" netns="" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.404 [INFO][3246] k8s.go 592: Releasing IP address(es) ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.404 [INFO][3246] utils.go 188: Calico CNI releasing IP address ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.421 [INFO][3254] ipam_plugin.go 415: Releasing address using handleID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.421 [INFO][3254] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.421 [INFO][3254] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.433 [WARNING][3254] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.433 [INFO][3254] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" HandleID="k8s-pod-network.c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Workload="10.200.20.19-k8s-csi--node--driver--zshnt-eth0" Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.434 [INFO][3254] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:38:15.436370 env[1334]: 2024-04-12 18:38:15.435 [INFO][3246] k8s.go 598: Teardown processing complete. ContainerID="c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51" Apr 12 18:38:15.436842 env[1334]: time="2024-04-12T18:38:15.436814822Z" level=info msg="TearDown network for sandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" successfully" Apr 12 18:38:15.444586 env[1334]: time="2024-04-12T18:38:15.444560262Z" level=info msg="RemovePodSandbox \"c5be5858b5464b79c92d0bb1f8b20d928c685def3772f7f8ba1bc57cebf9df51\" returns successfully" Apr 12 18:38:16.332942 kubelet[1917]: E0412 18:38:16.332891 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:17.333683 kubelet[1917]: E0412 18:38:17.333652 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:18.334466 kubelet[1917]: E0412 18:38:18.334422 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:19.334829 kubelet[1917]: E0412 18:38:19.334795 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:20.335359 kubelet[1917]: E0412 18:38:20.335322 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:21.336177 kubelet[1917]: E0412 18:38:21.336131 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:21.901919 kubelet[1917]: I0412 18:38:21.901859 1917 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:38:21.906196 systemd[1]: Created slice kubepods-besteffort-podc7a73063_5c62_45dd_9d5f_c3d81e9cd8fd.slice. Apr 12 18:38:21.975394 kubelet[1917]: I0412 18:38:21.975368 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zlknr\" (UniqueName: \"kubernetes.io/projected/c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd-kube-api-access-zlknr\") pod \"test-pod-1\" (UID: \"c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd\") " pod="default/test-pod-1" Apr 12 18:38:21.975703 kubelet[1917]: I0412 18:38:21.975689 1917 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-553a640e-1b41-4679-8c49-ee80480e2b06\" (UniqueName: \"kubernetes.io/nfs/c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd-pvc-553a640e-1b41-4679-8c49-ee80480e2b06\") pod \"test-pod-1\" (UID: \"c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd\") " pod="default/test-pod-1" Apr 12 18:38:22.196946 kernel: Failed to create system directory netfs Apr 12 18:38:22.197081 kernel: kauditd_printk_skb: 111 callbacks suppressed Apr 12 18:38:22.197115 kernel: audit: type=1400 audit(1712947102.185:810): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.197147 kernel: Failed to create system directory netfs Apr 12 18:38:22.185000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.185000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.220861 kernel: audit: type=1400 audit(1712947102.185:810): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.220933 kernel: Failed to create system directory netfs Apr 12 18:38:22.185000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.244158 kernel: audit: type=1400 audit(1712947102.185:810): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.244224 kernel: Failed to create system directory netfs Apr 12 18:38:22.185000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.263709 kernel: audit: type=1400 audit(1712947102.185:810): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.185000 audit[3275]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac7a425e0 a1=12c14 a2=aaaac558e028 a3=aaaac7a33010 items=0 ppid=51 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:22.314416 kernel: audit: type=1300 audit(1712947102.185:810): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac7a425e0 a1=12c14 a2=aaaac558e028 a3=aaaac7a33010 items=0 ppid=51 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:22.314557 kernel: audit: type=1327 audit(1712947102.185:810): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:38:22.185000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.338671 kubelet[1917]: E0412 18:38:22.338640 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:22.361945 kernel: Failed to create system directory fscache Apr 12 18:38:22.362040 kernel: audit: type=1400 audit(1712947102.330:811): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.362070 kernel: Failed to create system directory fscache Apr 12 18:38:22.362088 kernel: audit: type=1400 audit(1712947102.330:811): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.380652 kernel: Failed to create system directory fscache Apr 12 18:38:22.380732 kernel: audit: type=1400 audit(1712947102.330:811): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.427459 kernel: Failed to create system directory fscache Apr 12 18:38:22.427578 kernel: audit: type=1400 audit(1712947102.330:811): avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.427616 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.436194 kernel: Failed to create system directory fscache Apr 12 18:38:22.436247 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.445308 kernel: Failed to create system directory fscache Apr 12 18:38:22.445364 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.454110 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.458670 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.463050 kernel: Failed to create system directory fscache Apr 12 18:38:22.463133 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.330000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.471855 kernel: Failed to create system directory fscache Apr 12 18:38:22.330000 audit[3275]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac7c55210 a1=4c344 a2=aaaac558e028 a3=aaaac7a33010 items=0 ppid=51 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:22.330000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:38:22.475917 kernel: FS-Cache: Loaded Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.575368 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.575424 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.575440 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.584235 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.584282 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.592685 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.592739 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.600922 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.600973 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.609113 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.609185 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.617241 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.621471 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.621520 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.629607 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.629664 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.637561 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.637619 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.645326 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.645358 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.653325 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.653369 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.662158 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.662195 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.670698 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.675126 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.675168 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.682710 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.682810 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.690185 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.690261 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.697702 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.697773 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.701327 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.704907 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.712438 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.712507 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.719681 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.719739 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.727241 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.727291 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.734536 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.734587 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.742058 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.742122 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.749248 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.749314 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.756394 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.756452 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.763503 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.763570 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.770728 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.770787 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.778363 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.782138 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.782202 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.789718 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.793652 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.793716 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.802277 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.802375 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.809921 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.809969 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.817523 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.817558 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.824830 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.824875 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.832235 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.832290 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.839714 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.839763 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.846797 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.850655 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.850707 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.857774 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.857849 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.865117 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.865168 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.872141 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.872192 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.879219 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.883400 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.883447 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.891059 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.891123 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.898412 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.898467 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.905522 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.905558 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.913004 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.913057 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.920379 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.920431 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.927438 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.927469 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.935148 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.935183 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.942240 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.942294 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.949439 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.949533 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.956676 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.956733 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.964137 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.967871 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.967938 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.975124 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.975193 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.982398 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.986366 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.986425 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.993788 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.993846 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.001086 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.001150 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.008415 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.008464 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.015515 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.015570 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.022760 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.022811 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.029947 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.033560 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.033923 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.041232 kernel: Failed to create system directory sunrpc Apr 12 18:38:23.041276 kernel: Failed to create system directory sunrpc Apr 12 18:38:22.561000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.057974 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:38:23.058047 kernel: RPC: Registered udp transport module. Apr 12 18:38:23.061475 kernel: RPC: Registered tcp transport module. Apr 12 18:38:23.061523 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:38:22.561000 audit[3275]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac7ca1560 a1=14a344 a2=aaaac558e028 a3=aaaac7a33010 items=6 ppid=51 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:22.561000 audit: CWD cwd="/" Apr 12 18:38:22.561000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PATH item=1 name=(null) inode=21620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PATH item=2 name=(null) inode=21620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PATH item=3 name=(null) inode=21621 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PATH item=4 name=(null) inode=21620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PATH item=5 name=(null) inode=21622 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:38:22.561000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.202429 kernel: Failed to create system directory nfs Apr 12 18:38:23.202503 kernel: Failed to create system directory nfs Apr 12 18:38:23.202529 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.209314 kernel: Failed to create system directory nfs Apr 12 18:38:23.209365 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.216454 kernel: Failed to create system directory nfs Apr 12 18:38:23.216514 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.223335 kernel: Failed to create system directory nfs Apr 12 18:38:23.223399 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.230348 kernel: Failed to create system directory nfs Apr 12 18:38:23.230380 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.237131 kernel: Failed to create system directory nfs Apr 12 18:38:23.237169 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.244088 kernel: Failed to create system directory nfs Apr 12 18:38:23.244126 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.251397 kernel: Failed to create system directory nfs Apr 12 18:38:23.251440 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.258343 kernel: Failed to create system directory nfs Apr 12 18:38:23.258385 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.261921 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.268762 kernel: Failed to create system directory nfs Apr 12 18:38:23.268801 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.275778 kernel: Failed to create system directory nfs Apr 12 18:38:23.275819 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.282983 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.286471 kernel: Failed to create system directory nfs Apr 12 18:38:23.286514 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.293845 kernel: Failed to create system directory nfs Apr 12 18:38:23.293880 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.300737 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.304629 kernel: Failed to create system directory nfs Apr 12 18:38:23.304671 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.311856 kernel: Failed to create system directory nfs Apr 12 18:38:23.311919 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.318810 kernel: Failed to create system directory nfs Apr 12 18:38:23.318838 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.326060 kernel: Failed to create system directory nfs Apr 12 18:38:23.326101 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.333245 kernel: Failed to create system directory nfs Apr 12 18:38:23.333286 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.339609 kubelet[1917]: E0412 18:38:23.339559 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:23.340639 kernel: Failed to create system directory nfs Apr 12 18:38:23.340982 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.347908 kernel: Failed to create system directory nfs Apr 12 18:38:23.347955 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.351563 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.362452 kernel: Failed to create system directory nfs Apr 12 18:38:23.362495 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.369260 kernel: Failed to create system directory nfs Apr 12 18:38:23.369303 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.376510 kernel: Failed to create system directory nfs Apr 12 18:38:23.376553 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.380144 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.387565 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.391678 kernel: Failed to create system directory nfs Apr 12 18:38:23.391743 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.398815 kernel: Failed to create system directory nfs Apr 12 18:38:23.398851 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.405993 kernel: Failed to create system directory nfs Apr 12 18:38:23.406038 kernel: Failed to create system directory nfs Apr 12 18:38:23.190000 audit[3275]: AVC avc: denied { confidentiality } for pid=3275 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.190000 audit[3275]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac7e4a4f0 a1=115814 a2=aaaac558e028 a3=aaaac7a33010 items=0 ppid=51 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.190000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:38:23.428116 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.505719 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.505778 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.509342 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.509397 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.516999 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.517049 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.524272 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.524318 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.531199 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.531256 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.538011 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.538049 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.545287 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.545335 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.552131 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.555922 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.555948 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.563072 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.563100 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.570093 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.570151 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.577205 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.577241 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.584450 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.584504 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.591848 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.591930 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.599194 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.599227 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.606691 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.610518 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.610566 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.617587 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.617625 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.624642 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.624670 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.631572 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.631614 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.634923 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.641926 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.641956 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.648951 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.649019 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.656123 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.656166 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.663444 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.663487 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.670668 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.670713 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.677672 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.677714 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.684643 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.684686 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.691518 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.691564 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.698787 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.698844 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.706383 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.706449 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.713961 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.714005 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.720998 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.721058 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.727844 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.727882 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.734987 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.735030 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.742088 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.742117 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.749270 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.749345 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.756804 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.756858 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.764015 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.767977 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.768017 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.771351 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.774819 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.781946 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.781993 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.785418 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.788821 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.795963 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.796010 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.802753 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.802816 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.809675 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.809704 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.816636 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.816946 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.823915 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.823986 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.827611 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.831121 kernel: Failed to create system directory nfs4 Apr 12 18:38:23.492000 audit[3280]: AVC avc: denied { confidentiality } for pid=3280 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:23.940170 kernel: NFS: Registering the id_resolver key type Apr 12 18:38:23.940299 kernel: Key type id_resolver registered Apr 12 18:38:23.940318 kernel: Key type id_legacy registered Apr 12 18:38:23.492000 audit[3280]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8faab010 a1=19c244 a2=aaaae956e028 a3=aaab1b805010 items=0 ppid=51 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.492000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.128112 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.128185 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.132067 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.136107 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.140005 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.144046 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.147741 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.151465 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.155132 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.158925 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.162563 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.166271 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.170063 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.173919 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.178148 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.181980 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.185780 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.189699 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.193535 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.197421 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.201296 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.205222 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.209030 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.212834 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.216615 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.220505 kernel: Failed to create system directory rpcgss Apr 12 18:38:24.117000 audit[3281]: AVC avc: denied { confidentiality } for pid=3281 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:38:24.117000 audit[3281]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff87253010 a1=5ef34 a2=aaaabedfe028 a3=aaaad9b72010 items=0 ppid=51 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:24.117000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:38:24.340324 kubelet[1917]: E0412 18:38:24.340285 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:24.645015 nfsidmap[3288]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-d058ff16f4' Apr 12 18:38:24.654466 nfsidmap[3291]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-d058ff16f4' Apr 12 18:38:24.667000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1440]: AVC avc: denied { watch_reads } for pid=1440 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1440]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaacfd5f5f0 a2=10 a3=0 items=0 ppid=1 pid=1440 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:24.667000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:38:24.667000 audit[1440]: AVC avc: denied { watch_reads } for pid=1440 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1440]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaacfd5f5f0 a2=10 a3=0 items=0 ppid=1 pid=1440 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:24.667000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:38:24.667000 audit[1440]: AVC avc: denied { watch_reads } for pid=1440 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:38:24.667000 audit[1440]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaacfd5f5f0 a2=10 a3=0 items=0 ppid=1 pid=1440 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:24.667000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:38:24.909426 env[1334]: time="2024-04-12T18:38:24.908982090Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd,Namespace:default,Attempt:0,}" Apr 12 18:38:25.060264 systemd-networkd[1486]: cali5ec59c6bf6e: Link UP Apr 12 18:38:25.071735 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:38:25.071835 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:38:25.073263 systemd-networkd[1486]: cali5ec59c6bf6e: Gained carrier Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:24.978 [INFO][3292] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.19-k8s-test--pod--1-eth0 default c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd 1483 0 2024-04-12 18:37:48 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.19 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:24.978 [INFO][3292] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.001 [INFO][3304] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" HandleID="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Workload="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.027 [INFO][3304] ipam_plugin.go 268: Auto assigning IP ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" HandleID="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Workload="10.200.20.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029c930), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.19", "pod":"test-pod-1", "timestamp":"2024-04-12 18:38:25.001797492 +0000 UTC"}, Hostname:"10.200.20.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.027 [INFO][3304] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.027 [INFO][3304] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.027 [INFO][3304] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.19' Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.028 [INFO][3304] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.032 [INFO][3304] ipam.go 372: Looking up existing affinities for host host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.036 [INFO][3304] ipam.go 489: Trying affinity for 192.168.5.64/26 host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.038 [INFO][3304] ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.040 [INFO][3304] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.040 [INFO][3304] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.041 [INFO][3304] ipam.go 1682: Creating new handle: k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6 Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.044 [INFO][3304] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.053 [INFO][3304] ipam.go 1216: Successfully claimed IPs: [192.168.5.68/26] block=192.168.5.64/26 handle="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.053 [INFO][3304] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.68/26] handle="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" host="10.200.20.19" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.053 [INFO][3304] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.053 [INFO][3304] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.68/26] IPv6=[] ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" HandleID="k8s-pod-network.6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Workload="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.055 [INFO][3292] k8s.go 385: Populated endpoint ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd", ResourceVersion:"1483", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:38:25.085555 env[1334]: 2024-04-12 18:38:25.055 [INFO][3292] k8s.go 386: Calico CNI using IPs: [192.168.5.68/32] ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.086169 env[1334]: 2024-04-12 18:38:25.055 [INFO][3292] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.086169 env[1334]: 2024-04-12 18:38:25.073 [INFO][3292] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.086169 env[1334]: 2024-04-12 18:38:25.073 [INFO][3292] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd", ResourceVersion:"1483", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 37, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.19", ContainerID:"6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ee:4a:69:47:5a:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:38:25.086169 env[1334]: 2024-04-12 18:38:25.083 [INFO][3292] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.19-k8s-test--pod--1-eth0" Apr 12 18:38:25.093000 audit[3324]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:38:25.093000 audit[3324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffc3995120 a2=0 a3=ffffa0f21fa8 items=0 ppid=2560 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:38:25.101876 env[1334]: time="2024-04-12T18:38:25.101751053Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:38:25.101876 env[1334]: time="2024-04-12T18:38:25.101792213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:38:25.101876 env[1334]: time="2024-04-12T18:38:25.101802493Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:38:25.102219 env[1334]: time="2024-04-12T18:38:25.102171733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6 pid=3333 runtime=io.containerd.runc.v2 Apr 12 18:38:25.116307 systemd[1]: Started cri-containerd-6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6.scope. Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.129000 audit: BPF prog-id=115 op=LOAD Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3333 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662376337613733636437653634616364306261643564316536626462 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3333 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662376337613733636437653634616364306261643564316536626462 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit: BPF prog-id=116 op=LOAD Apr 12 18:38:25.130000 audit[3344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3333 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662376337613733636437653634616364306261643564316536626462 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit: BPF prog-id=117 op=LOAD Apr 12 18:38:25.130000 audit[3344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3333 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662376337613733636437653634616364306261643564316536626462 Apr 12 18:38:25.130000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:38:25.130000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.130000 audit: BPF prog-id=118 op=LOAD Apr 12 18:38:25.130000 audit[3344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3333 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662376337613733636437653634616364306261643564316536626462 Apr 12 18:38:25.149588 env[1334]: time="2024-04-12T18:38:25.149542334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c7a73063-5c62-45dd-9d5f-c3d81e9cd8fd,Namespace:default,Attempt:0,} returns sandbox id \"6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6\"" Apr 12 18:38:25.151656 env[1334]: time="2024-04-12T18:38:25.151632774Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:38:25.341941 kubelet[1917]: E0412 18:38:25.341064 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:25.567534 env[1334]: time="2024-04-12T18:38:25.567486380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:38:25.574723 env[1334]: time="2024-04-12T18:38:25.574695180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:38:25.578679 env[1334]: time="2024-04-12T18:38:25.578652580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:38:25.585584 env[1334]: time="2024-04-12T18:38:25.585546260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:38:25.586326 env[1334]: time="2024-04-12T18:38:25.586298620Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:38:25.588570 env[1334]: time="2024-04-12T18:38:25.588535180Z" level=info msg="CreateContainer within sandbox \"6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:38:25.624746 env[1334]: time="2024-04-12T18:38:25.624637581Z" level=info msg="CreateContainer within sandbox \"6b7c7a73cd7e64acd0bad5d1e6bdbf199812110e6f9d7b4102f9242c40fe53d6\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e14be8ecd12a007012a3bfdc1ec8b3a84b102e99af19ecee8bd32f91a9e70164\"" Apr 12 18:38:25.625428 env[1334]: time="2024-04-12T18:38:25.625378461Z" level=info msg="StartContainer for \"e14be8ecd12a007012a3bfdc1ec8b3a84b102e99af19ecee8bd32f91a9e70164\"" Apr 12 18:38:25.639681 systemd[1]: Started cri-containerd-e14be8ecd12a007012a3bfdc1ec8b3a84b102e99af19ecee8bd32f91a9e70164.scope. Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.652000 audit: BPF prog-id=119 op=LOAD Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3333 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346265386563643132613030373031326133626664633165633862 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3333 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346265386563643132613030373031326133626664633165633862 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit: BPF prog-id=120 op=LOAD Apr 12 18:38:25.653000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3333 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346265386563643132613030373031326133626664633165633862 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit: BPF prog-id=121 op=LOAD Apr 12 18:38:25.653000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3333 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346265386563643132613030373031326133626664633165633862 Apr 12 18:38:25.653000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:38:25.653000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:25.653000 audit: BPF prog-id=122 op=LOAD Apr 12 18:38:25.653000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3333 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:25.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346265386563643132613030373031326133626664633165633862 Apr 12 18:38:25.677387 env[1334]: time="2024-04-12T18:38:25.677345862Z" level=info msg="StartContainer for \"e14be8ecd12a007012a3bfdc1ec8b3a84b102e99af19ecee8bd32f91a9e70164\" returns successfully" Apr 12 18:38:26.125104 systemd-networkd[1486]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:38:26.341798 kubelet[1917]: E0412 18:38:26.341759 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:27.342944 kubelet[1917]: E0412 18:38:27.342905 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:28.343701 kubelet[1917]: E0412 18:38:28.343668 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:29.344865 kubelet[1917]: E0412 18:38:29.344831 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:30.345570 kubelet[1917]: E0412 18:38:30.345536 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:31.345890 kubelet[1917]: E0412 18:38:31.345852 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:32.346482 kubelet[1917]: E0412 18:38:32.346455 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:33.347817 kubelet[1917]: E0412 18:38:33.347785 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:34.348550 kubelet[1917]: E0412 18:38:34.348520 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:35.293154 kubelet[1917]: E0412 18:38:35.293124 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:35.349292 kubelet[1917]: E0412 18:38:35.349265 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:36.350326 kubelet[1917]: E0412 18:38:36.350290 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:37.350793 kubelet[1917]: E0412 18:38:37.350760 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:38.032136 systemd[1]: run-containerd-runc-k8s.io-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a-runc.6KMxqC.mount: Deactivated successfully. Apr 12 18:38:38.351902 kubelet[1917]: E0412 18:38:38.351788 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:39.352502 kubelet[1917]: E0412 18:38:39.352472 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:40.353911 kubelet[1917]: E0412 18:38:40.353870 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:41.354786 kubelet[1917]: E0412 18:38:41.354748 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:42.356354 kubelet[1917]: E0412 18:38:42.356326 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:43.356766 kubelet[1917]: E0412 18:38:43.356735 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:44.357458 kubelet[1917]: E0412 18:38:44.357422 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:45.118515 kubelet[1917]: E0412 18:38:45.118482 1917 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.27:49900->10.200.20.40:2379: read: connection timed out" Apr 12 18:38:45.358207 kubelet[1917]: E0412 18:38:45.358156 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:46.358305 kubelet[1917]: E0412 18:38:46.358256 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:47.358884 kubelet[1917]: E0412 18:38:47.358849 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:48.359886 kubelet[1917]: E0412 18:38:48.359820 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:49.361384 kubelet[1917]: E0412 18:38:49.361341 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:50.362457 kubelet[1917]: E0412 18:38:50.362422 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:51.363464 kubelet[1917]: E0412 18:38:51.363430 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:52.363599 kubelet[1917]: E0412 18:38:52.363543 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:53.363980 kubelet[1917]: E0412 18:38:53.363948 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:54.364613 kubelet[1917]: E0412 18:38:54.364579 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:55.119194 kubelet[1917]: E0412 18:38:55.119164 1917 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.19?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:38:55.292740 kubelet[1917]: E0412 18:38:55.292704 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:55.365138 kubelet[1917]: E0412 18:38:55.365110 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:56.366517 kubelet[1917]: E0412 18:38:56.366480 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:57.367344 kubelet[1917]: E0412 18:38:57.367312 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:58.367966 kubelet[1917]: E0412 18:38:58.367918 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:38:59.368678 kubelet[1917]: E0412 18:38:59.368645 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:00.369675 kubelet[1917]: E0412 18:39:00.369641 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:01.370644 kubelet[1917]: E0412 18:39:01.370615 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:02.372088 kubelet[1917]: E0412 18:39:02.372060 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:03.372989 kubelet[1917]: E0412 18:39:03.372952 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:04.373632 kubelet[1917]: E0412 18:39:04.373604 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:05.119855 kubelet[1917]: E0412 18:39:05.119822 1917 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.19?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:05.375115 kubelet[1917]: E0412 18:39:05.375013 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:06.375831 kubelet[1917]: E0412 18:39:06.375791 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:07.377003 kubelet[1917]: E0412 18:39:07.376969 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:08.032442 systemd[1]: run-containerd-runc-k8s.io-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a-runc.l2YZZi.mount: Deactivated successfully. Apr 12 18:39:08.377297 kubelet[1917]: E0412 18:39:08.377173 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:09.378201 kubelet[1917]: E0412 18:39:09.378149 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:10.378330 kubelet[1917]: E0412 18:39:10.378288 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:11.379058 kubelet[1917]: E0412 18:39:11.379015 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:12.380055 kubelet[1917]: E0412 18:39:12.380025 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:13.380501 kubelet[1917]: E0412 18:39:13.380473 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:14.380915 kubelet[1917]: E0412 18:39:14.380872 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:15.120255 kubelet[1917]: E0412 18:39:15.120218 1917 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.19?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:15.293084 kubelet[1917]: E0412 18:39:15.293043 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:15.381823 kubelet[1917]: E0412 18:39:15.381802 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:16.382534 kubelet[1917]: E0412 18:39:16.382507 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:17.382969 kubelet[1917]: E0412 18:39:17.382938 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:18.383821 kubelet[1917]: E0412 18:39:18.383792 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:19.384741 kubelet[1917]: E0412 18:39:19.384716 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:20.385320 kubelet[1917]: E0412 18:39:20.385288 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:21.385795 kubelet[1917]: E0412 18:39:21.385758 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:22.385996 kubelet[1917]: E0412 18:39:22.385961 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:23.386964 kubelet[1917]: E0412 18:39:23.386927 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:24.387590 kubelet[1917]: E0412 18:39:24.387557 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:25.121169 kubelet[1917]: E0412 18:39:25.121141 1917 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.19?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:25.121359 kubelet[1917]: I0412 18:39:25.121346 1917 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Apr 12 18:39:25.388183 kubelet[1917]: E0412 18:39:25.388165 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:26.389417 kubelet[1917]: E0412 18:39:26.389386 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:27.389640 kubelet[1917]: E0412 18:39:27.389615 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:28.390686 kubelet[1917]: E0412 18:39:28.390656 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:29.022569 kubelet[1917]: E0412 18:39:29.022540 1917 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.19\": Get \"https://10.200.20.27:6443/api/v1/nodes/10.200.20.19?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:29.391183 kubelet[1917]: E0412 18:39:29.391154 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:30.391475 kubelet[1917]: E0412 18:39:30.391444 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:31.392226 kubelet[1917]: E0412 18:39:31.392196 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:32.393260 kubelet[1917]: E0412 18:39:32.393234 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:33.394117 kubelet[1917]: E0412 18:39:33.394088 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:34.394868 kubelet[1917]: E0412 18:39:34.394839 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:35.122279 kubelet[1917]: E0412 18:39:35.122253 1917 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.19?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Apr 12 18:39:35.292306 kubelet[1917]: E0412 18:39:35.292260 1917 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:35.395791 kubelet[1917]: E0412 18:39:35.395773 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:36.396383 kubelet[1917]: E0412 18:39:36.396353 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:37.396977 kubelet[1917]: E0412 18:39:37.396953 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:38.035698 systemd[1]: run-containerd-runc-k8s.io-987332c9a1a585ad8b970868b4c8800e766c03b0377336129118ae010f19171a-runc.bbc5Cj.mount: Deactivated successfully. Apr 12 18:39:38.088680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.089019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#245 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.089148 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#254 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.104217 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#246 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.104400 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#252 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.111782 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#243 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.119929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#240 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.135475 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#242 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.135642 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#244 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.142960 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#241 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.150655 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#247 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.158215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#248 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.166073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#249 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.173521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#250 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.181106 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#251 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.207237 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#251 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.207421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#250 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.207533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#249 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.222982 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#248 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.223178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#247 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.230463 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#241 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.238043 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#244 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.245773 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#242 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.253379 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#240 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.261273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#243 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.268765 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#252 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.276350 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#246 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.284224 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#254 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.291759 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#245 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.306857 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.307030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#255 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.336574 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#255 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.336751 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.343674 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#245 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.351218 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#254 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.358766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#246 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.366048 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#252 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.373232 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#243 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.380869 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#240 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.388328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#242 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.395719 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#244 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.398040 kubelet[1917]: E0412 18:39:38.397998 1917 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:39:38.403134 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#241 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.410442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#247 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.417758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#248 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.425155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#249 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.432683 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#250 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.439966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#251 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.462494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#251 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.462669 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#250 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.469882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#249 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.477540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#248 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.484930 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#247 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.492336 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#241 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.499655 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#244 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.506932 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#242 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.514870 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#240 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.522465 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#243 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.530174 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#252 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.537884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#246 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.545715 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#254 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.553454 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#245 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:38.566676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001