Apr 12 18:31:26.980743 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:31:26.980762 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:31:26.980770 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Apr 12 18:31:26.980776 kernel: printk: bootconsole [pl11] enabled Apr 12 18:31:26.980781 kernel: efi: EFI v2.70 by EDK II Apr 12 18:31:26.980787 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Apr 12 18:31:26.980793 kernel: random: crng init done Apr 12 18:31:26.980799 kernel: ACPI: Early table checksum verification disabled Apr 12 18:31:26.980804 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Apr 12 18:31:26.980809 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980815 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980821 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Apr 12 18:31:26.980827 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980832 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980839 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980844 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980850 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980857 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980863 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Apr 12 18:31:26.980868 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:26.980874 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Apr 12 18:31:26.980879 kernel: NUMA: Failed to initialise from firmware Apr 12 18:31:26.980885 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:31:26.980891 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Apr 12 18:31:26.980896 kernel: Zone ranges: Apr 12 18:31:26.980902 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Apr 12 18:31:26.980907 kernel: DMA32 empty Apr 12 18:31:26.980914 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:31:26.980919 kernel: Movable zone start for each node Apr 12 18:31:26.980925 kernel: Early memory node ranges Apr 12 18:31:26.980931 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Apr 12 18:31:26.980936 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Apr 12 18:31:26.980942 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Apr 12 18:31:26.980948 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Apr 12 18:31:26.980953 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Apr 12 18:31:26.980959 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Apr 12 18:31:26.980964 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Apr 12 18:31:26.980970 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Apr 12 18:31:26.980975 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:31:26.980982 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:31:26.980990 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Apr 12 18:31:26.980996 kernel: psci: probing for conduit method from ACPI. Apr 12 18:31:26.981002 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:31:26.981008 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:31:26.981016 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 18:31:26.981022 kernel: psci: SMC Calling Convention v1.4 Apr 12 18:31:26.981028 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Apr 12 18:31:26.981034 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Apr 12 18:31:26.981040 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:31:26.981045 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:31:26.981052 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:31:26.981057 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:31:26.981063 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:31:26.981069 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:31:26.981076 kernel: CPU features: detected: Spectre-BHB Apr 12 18:31:26.981081 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:31:26.981089 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:31:26.981094 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:31:26.981100 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Apr 12 18:31:26.981106 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Apr 12 18:31:26.981112 kernel: Policy zone: Normal Apr 12 18:31:26.981120 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:26.981126 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:31:26.981132 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:31:26.981138 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:31:26.981144 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:31:26.981151 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Apr 12 18:31:26.981158 kernel: Memory: 3990264K/4194160K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 203896K reserved, 0K cma-reserved) Apr 12 18:31:26.981164 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:31:26.981170 kernel: trace event string verifier disabled Apr 12 18:31:26.981176 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:31:26.986217 kernel: rcu: RCU event tracing is enabled. Apr 12 18:31:26.986232 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:31:26.986239 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:31:26.986250 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:31:26.986258 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:31:26.986264 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:31:26.986274 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:31:26.986281 kernel: GICv3: 960 SPIs implemented Apr 12 18:31:26.986286 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:31:26.986292 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:31:26.986298 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:31:26.986304 kernel: GICv3: 16 PPIs implemented Apr 12 18:31:26.986313 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Apr 12 18:31:26.986320 kernel: ITS: No ITS available, not enabling LPIs Apr 12 18:31:26.986327 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:26.986333 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:31:26.986339 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:31:26.986346 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:31:26.986354 kernel: Console: colour dummy device 80x25 Apr 12 18:31:26.986360 kernel: printk: console [tty1] enabled Apr 12 18:31:26.986369 kernel: ACPI: Core revision 20210730 Apr 12 18:31:26.986376 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:31:26.986382 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:31:26.986388 kernel: LSM: Security Framework initializing Apr 12 18:31:26.986395 kernel: SELinux: Initializing. Apr 12 18:31:26.986401 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:26.986407 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:26.986417 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Apr 12 18:31:26.986424 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Apr 12 18:31:26.986430 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:31:26.986436 kernel: Remapping and enabling EFI services. Apr 12 18:31:26.986442 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:31:26.986448 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:31:26.986455 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Apr 12 18:31:26.986461 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:26.986470 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:31:26.986477 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:31:26.986484 kernel: SMP: Total of 2 processors activated. Apr 12 18:31:26.986490 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:31:26.986496 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Apr 12 18:31:26.986503 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:31:26.986509 kernel: CPU features: detected: CRC32 instructions Apr 12 18:31:26.986515 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:31:26.986522 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:31:26.986528 kernel: CPU features: detected: Privileged Access Never Apr 12 18:31:26.986535 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:31:26.986544 kernel: alternatives: patching kernel code Apr 12 18:31:26.986556 kernel: devtmpfs: initialized Apr 12 18:31:26.986563 kernel: KASLR enabled Apr 12 18:31:26.986570 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:31:26.986577 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:31:26.986583 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:31:26.986592 kernel: SMBIOS 3.1.0 present. Apr 12 18:31:26.986599 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Apr 12 18:31:26.986606 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:31:26.986613 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:31:26.986620 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:31:26.986627 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:31:26.986633 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:31:26.986643 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Apr 12 18:31:26.986649 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:31:26.986656 kernel: cpuidle: using governor menu Apr 12 18:31:26.986663 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:31:26.986670 kernel: ASID allocator initialised with 32768 entries Apr 12 18:31:26.986676 kernel: ACPI: bus type PCI registered Apr 12 18:31:26.986683 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:31:26.986692 kernel: Serial: AMBA PL011 UART driver Apr 12 18:31:26.986698 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:31:26.986705 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:31:26.986711 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:31:26.986718 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:31:26.986726 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:31:26.986733 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:31:26.986739 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:31:26.986746 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:31:26.986755 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:31:26.986761 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:31:26.986768 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:31:26.986774 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:31:26.986781 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:31:26.986789 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:31:26.986795 kernel: ACPI: Interpreter enabled Apr 12 18:31:26.986802 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:31:26.986808 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:31:26.986815 kernel: printk: console [ttyAMA0] enabled Apr 12 18:31:26.986822 kernel: printk: bootconsole [pl11] disabled Apr 12 18:31:26.986831 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Apr 12 18:31:26.986837 kernel: iommu: Default domain type: Translated Apr 12 18:31:26.986844 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:31:26.986851 kernel: vgaarb: loaded Apr 12 18:31:26.986858 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:31:26.986864 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:31:26.986871 kernel: PTP clock support registered Apr 12 18:31:26.986877 kernel: Registered efivars operations Apr 12 18:31:26.986886 kernel: No ACPI PMU IRQ for CPU0 Apr 12 18:31:26.986893 kernel: No ACPI PMU IRQ for CPU1 Apr 12 18:31:26.986899 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:31:26.986905 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:31:26.986913 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:31:26.986920 kernel: pnp: PnP ACPI init Apr 12 18:31:26.986926 kernel: pnp: PnP ACPI: found 0 devices Apr 12 18:31:26.986935 kernel: NET: Registered PF_INET protocol family Apr 12 18:31:26.986942 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:31:26.986948 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:31:26.986955 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:31:26.986962 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:31:26.986968 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:31:26.986976 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:31:26.986983 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:26.986992 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:26.986999 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:31:26.987005 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:31:26.987012 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Apr 12 18:31:26.987018 kernel: kvm [1]: HYP mode not available Apr 12 18:31:26.987025 kernel: Initialise system trusted keyrings Apr 12 18:31:26.987031 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:31:26.987041 kernel: Key type asymmetric registered Apr 12 18:31:26.987048 kernel: Asymmetric key parser 'x509' registered Apr 12 18:31:26.987054 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:31:26.987061 kernel: io scheduler mq-deadline registered Apr 12 18:31:26.987067 kernel: io scheduler kyber registered Apr 12 18:31:26.987074 kernel: io scheduler bfq registered Apr 12 18:31:26.987080 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:31:26.987089 kernel: thunder_xcv, ver 1.0 Apr 12 18:31:26.987095 kernel: thunder_bgx, ver 1.0 Apr 12 18:31:26.987103 kernel: nicpf, ver 1.0 Apr 12 18:31:26.987110 kernel: nicvf, ver 1.0 Apr 12 18:31:26.987248 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:31:26.987321 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:31:26 UTC (1712946686) Apr 12 18:31:26.987330 kernel: efifb: probing for efifb Apr 12 18:31:26.987337 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Apr 12 18:31:26.987344 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Apr 12 18:31:26.987350 kernel: efifb: scrolling: redraw Apr 12 18:31:26.987362 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 18:31:26.987369 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:31:26.987375 kernel: fb0: EFI VGA frame buffer device Apr 12 18:31:26.987381 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Apr 12 18:31:26.987388 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:31:26.987394 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:31:26.987401 kernel: Segment Routing with IPv6 Apr 12 18:31:26.987410 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:31:26.987416 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:31:26.987424 kernel: Key type dns_resolver registered Apr 12 18:31:26.987430 kernel: registered taskstats version 1 Apr 12 18:31:26.987437 kernel: Loading compiled-in X.509 certificates Apr 12 18:31:26.987444 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:31:26.987450 kernel: Key type .fscrypt registered Apr 12 18:31:26.987460 kernel: Key type fscrypt-provisioning registered Apr 12 18:31:26.987466 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:31:26.987473 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:31:26.987479 kernel: ima: No architecture policies found Apr 12 18:31:26.987487 kernel: Freeing unused kernel memory: 36352K Apr 12 18:31:26.987494 kernel: Run /init as init process Apr 12 18:31:26.987502 kernel: with arguments: Apr 12 18:31:26.987509 kernel: /init Apr 12 18:31:26.987515 kernel: with environment: Apr 12 18:31:26.987522 kernel: HOME=/ Apr 12 18:31:26.987528 kernel: TERM=linux Apr 12 18:31:26.991199 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:31:26.991221 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:26.991234 systemd[1]: Detected virtualization microsoft. Apr 12 18:31:26.991242 systemd[1]: Detected architecture arm64. Apr 12 18:31:26.991249 systemd[1]: Running in initrd. Apr 12 18:31:26.991256 systemd[1]: No hostname configured, using default hostname. Apr 12 18:31:26.991263 systemd[1]: Hostname set to . Apr 12 18:31:26.991270 systemd[1]: Initializing machine ID from random generator. Apr 12 18:31:26.991277 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:31:26.991286 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:26.991293 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:26.991300 systemd[1]: Reached target paths.target. Apr 12 18:31:26.991307 systemd[1]: Reached target slices.target. Apr 12 18:31:26.991314 systemd[1]: Reached target swap.target. Apr 12 18:31:26.991320 systemd[1]: Reached target timers.target. Apr 12 18:31:26.991328 systemd[1]: Listening on iscsid.socket. Apr 12 18:31:26.991335 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:31:26.991344 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:31:26.991351 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:31:26.991358 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:31:26.991365 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:26.991372 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:26.991379 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:26.991385 systemd[1]: Reached target sockets.target. Apr 12 18:31:26.991393 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:26.991399 systemd[1]: Finished network-cleanup.service. Apr 12 18:31:26.991408 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:31:26.991415 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:26.991422 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:26.991429 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:26.991436 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:31:26.991446 systemd-journald[236]: Journal started Apr 12 18:31:26.991493 systemd-journald[236]: Runtime Journal (/run/log/journal/5e03063f75b245568030e9b1b03ff1e4) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:31:26.973225 systemd-modules-load[237]: Inserted module 'overlay' Apr 12 18:31:27.018091 systemd[1]: Started systemd-journald.service. Apr 12 18:31:27.018118 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:31:27.010248 systemd-resolved[238]: Positive Trust Anchors: Apr 12 18:31:27.010255 systemd-resolved[238]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:27.073747 kernel: Bridge firewalling registered Apr 12 18:31:27.073776 kernel: audit: type=1130 audit(1712946687.040:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.073787 kernel: SCSI subsystem initialized Apr 12 18:31:27.073796 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:31:27.073804 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:31:27.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.010283 systemd-resolved[238]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:27.130677 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:31:27.130699 kernel: audit: type=1130 audit(1712946687.116:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.012307 systemd-resolved[238]: Defaulting to hostname 'linux'. Apr 12 18:31:27.029286 systemd-modules-load[237]: Inserted module 'br_netfilter' Apr 12 18:31:27.160130 kernel: audit: type=1130 audit(1712946687.139:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.056411 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:27.116983 systemd-modules-load[237]: Inserted module 'dm_multipath' Apr 12 18:31:27.192256 kernel: audit: type=1130 audit(1712946687.164:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.131851 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:27.140208 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:31:27.240244 kernel: audit: type=1130 audit(1712946687.172:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.240276 kernel: audit: type=1130 audit(1712946687.196:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.164506 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:27.172536 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:31:27.197347 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:27.225895 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:31:27.245812 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:27.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.261865 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:31:27.300004 kernel: audit: type=1130 audit(1712946687.279:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.275492 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:27.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.292459 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:31:27.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.304376 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:31:27.357044 kernel: audit: type=1130 audit(1712946687.303:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.357069 kernel: audit: type=1130 audit(1712946687.326:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.357079 dracut-cmdline[258]: dracut-dracut-053 Apr 12 18:31:27.330693 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:31:27.366800 dracut-cmdline[258]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:27.453205 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:31:27.468208 kernel: iscsi: registered transport (tcp) Apr 12 18:31:27.487955 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:31:27.487973 kernel: QLogic iSCSI HBA Driver Apr 12 18:31:27.522148 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:31:27.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.527126 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:31:27.578891 kernel: raid6: neonx8 gen() 13820 MB/s Apr 12 18:31:27.598193 kernel: raid6: neonx8 xor() 10382 MB/s Apr 12 18:31:27.619191 kernel: raid6: neonx4 gen() 13529 MB/s Apr 12 18:31:27.639189 kernel: raid6: neonx4 xor() 11334 MB/s Apr 12 18:31:27.659189 kernel: raid6: neonx2 gen() 12974 MB/s Apr 12 18:31:27.680197 kernel: raid6: neonx2 xor() 10371 MB/s Apr 12 18:31:27.700217 kernel: raid6: neonx1 gen() 10523 MB/s Apr 12 18:31:27.720191 kernel: raid6: neonx1 xor() 8794 MB/s Apr 12 18:31:27.741191 kernel: raid6: int64x8 gen() 6276 MB/s Apr 12 18:31:27.761194 kernel: raid6: int64x8 xor() 3544 MB/s Apr 12 18:31:27.781194 kernel: raid6: int64x4 gen() 7224 MB/s Apr 12 18:31:27.802190 kernel: raid6: int64x4 xor() 3854 MB/s Apr 12 18:31:27.822194 kernel: raid6: int64x2 gen() 6156 MB/s Apr 12 18:31:27.842193 kernel: raid6: int64x2 xor() 3323 MB/s Apr 12 18:31:27.863191 kernel: raid6: int64x1 gen() 5046 MB/s Apr 12 18:31:27.887486 kernel: raid6: int64x1 xor() 2647 MB/s Apr 12 18:31:27.887495 kernel: raid6: using algorithm neonx8 gen() 13820 MB/s Apr 12 18:31:27.887503 kernel: raid6: .... xor() 10382 MB/s, rmw enabled Apr 12 18:31:27.891624 kernel: raid6: using neon recovery algorithm Apr 12 18:31:27.908193 kernel: xor: measuring software checksum speed Apr 12 18:31:27.916400 kernel: 8regs : 17315 MB/sec Apr 12 18:31:27.916411 kernel: 32regs : 20755 MB/sec Apr 12 18:31:27.921291 kernel: arm64_neon : 28102 MB/sec Apr 12 18:31:27.921301 kernel: xor: using function: arm64_neon (28102 MB/sec) Apr 12 18:31:27.980198 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:31:27.988907 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:31:27.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.996000 audit: BPF prog-id=7 op=LOAD Apr 12 18:31:27.996000 audit: BPF prog-id=8 op=LOAD Apr 12 18:31:27.997372 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:28.011313 systemd-udevd[435]: Using default interface naming scheme 'v252'. Apr 12 18:31:28.017944 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:28.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:28.027551 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:31:28.037536 dracut-pre-trigger[456]: rd.md=0: removing MD RAID activation Apr 12 18:31:28.065685 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:31:28.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:28.071014 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:28.105410 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:28.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:28.159220 kernel: hv_vmbus: Vmbus version:5.3 Apr 12 18:31:28.169201 kernel: hv_vmbus: registering driver hid_hyperv Apr 12 18:31:28.190201 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Apr 12 18:31:28.190253 kernel: hv_vmbus: registering driver hyperv_keyboard Apr 12 18:31:28.190263 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Apr 12 18:31:28.190455 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Apr 12 18:31:28.207208 kernel: hv_vmbus: registering driver hv_netvsc Apr 12 18:31:28.212210 kernel: hv_vmbus: registering driver hv_storvsc Apr 12 18:31:28.218902 kernel: scsi host0: storvsc_host_t Apr 12 18:31:28.219057 kernel: scsi host1: storvsc_host_t Apr 12 18:31:28.225612 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Apr 12 18:31:28.236207 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Apr 12 18:31:28.264931 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Apr 12 18:31:28.265223 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:31:28.265235 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Apr 12 18:31:28.269445 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 18:31:28.269573 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Apr 12 18:31:28.274322 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 18:31:28.280785 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Apr 12 18:31:28.280900 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Apr 12 18:31:28.287200 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:28.291204 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 18:31:28.311209 kernel: hv_netvsc 002248b6-4523-0022-48b6-4523002248b6 eth0: VF slot 1 added Apr 12 18:31:28.327368 kernel: hv_vmbus: registering driver hv_pci Apr 12 18:31:28.327418 kernel: hv_pci 0924a08c-fc61-4b2a-bb35-0f70f0dbfa68: PCI VMBus probing: Using version 0x10004 Apr 12 18:31:28.342767 kernel: hv_pci 0924a08c-fc61-4b2a-bb35-0f70f0dbfa68: PCI host bridge to bus fc61:00 Apr 12 18:31:28.342912 kernel: pci_bus fc61:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Apr 12 18:31:28.343032 kernel: pci_bus fc61:00: No busn resource found for root bus, will use [bus 00-ff] Apr 12 18:31:28.357396 kernel: pci fc61:00:02.0: [15b3:1018] type 00 class 0x020000 Apr 12 18:31:28.368244 kernel: pci fc61:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:31:28.387496 kernel: pci fc61:00:02.0: enabling Extended Tags Apr 12 18:31:28.404320 kernel: pci fc61:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at fc61:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Apr 12 18:31:28.415860 kernel: pci_bus fc61:00: busn_res: [bus 00-ff] end is updated to 00 Apr 12 18:31:28.416084 kernel: pci fc61:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:31:28.457221 kernel: mlx5_core fc61:00:02.0: firmware version: 16.30.1284 Apr 12 18:31:28.611201 kernel: mlx5_core fc61:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Apr 12 18:31:28.670274 kernel: hv_netvsc 002248b6-4523-0022-48b6-4523002248b6 eth0: VF registering: eth1 Apr 12 18:31:28.670471 kernel: mlx5_core fc61:00:02.0 eth1: joined to eth0 Apr 12 18:31:28.682212 kernel: mlx5_core fc61:00:02.0 enP64609s1: renamed from eth1 Apr 12 18:31:28.788729 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:31:28.852210 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (502) Apr 12 18:31:28.865160 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:29.063894 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:31:29.126934 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:31:29.132836 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:31:29.146596 systemd[1]: Starting disk-uuid.service... Apr 12 18:31:29.171446 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:29.180206 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:30.181204 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:30.181332 disk-uuid[561]: The operation has completed successfully. Apr 12 18:31:30.231561 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:31:30.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.231648 systemd[1]: Finished disk-uuid.service. Apr 12 18:31:30.244970 systemd[1]: Starting verity-setup.service... Apr 12 18:31:30.286209 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:31:30.525039 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:31:30.530228 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:31:30.538721 systemd[1]: Finished verity-setup.service. Apr 12 18:31:30.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.590207 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:31:30.590902 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:31:30.594675 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:31:30.595381 systemd[1]: Starting ignition-setup.service... Apr 12 18:31:30.602068 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:31:30.634604 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:30.634638 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:30.639094 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:30.691498 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:31:30.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.699000 audit: BPF prog-id=9 op=LOAD Apr 12 18:31:30.700602 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:30.720881 systemd-networkd[803]: lo: Link UP Apr 12 18:31:30.720892 systemd-networkd[803]: lo: Gained carrier Apr 12 18:31:30.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.721276 systemd-networkd[803]: Enumeration completed Apr 12 18:31:30.721859 systemd-networkd[803]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:30.724483 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:30.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.734094 systemd[1]: Reached target network.target. Apr 12 18:31:30.738975 systemd[1]: Starting iscsiuio.service... Apr 12 18:31:30.770568 iscsid[812]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:30.770568 iscsid[812]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:31:30.770568 iscsid[812]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:31:30.770568 iscsid[812]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:31:30.770568 iscsid[812]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:31:30.770568 iscsid[812]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:30.770568 iscsid[812]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:31:30.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.749769 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:31:30.876352 kernel: mlx5_core fc61:00:02.0 enP64609s1: Link up Apr 12 18:31:30.750092 systemd[1]: Started iscsiuio.service. Apr 12 18:31:30.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.756096 systemd[1]: Starting iscsid.service... Apr 12 18:31:30.770318 systemd[1]: Started iscsid.service. Apr 12 18:31:30.782212 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:31:30.815695 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:31:30.820341 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:31:30.825266 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:30.921729 kernel: hv_netvsc 002248b6-4523-0022-48b6-4523002248b6 eth0: Data path switched to VF: enP64609s1 Apr 12 18:31:30.921908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:30.834712 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:30.845973 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:31:30.876315 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:31:30.911547 systemd-networkd[803]: enP64609s1: Link UP Apr 12 18:31:30.911723 systemd-networkd[803]: eth0: Link UP Apr 12 18:31:30.921681 systemd-networkd[803]: eth0: Gained carrier Apr 12 18:31:30.941447 systemd-networkd[803]: enP64609s1: Gained carrier Apr 12 18:31:30.954244 systemd-networkd[803]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:31.019262 systemd[1]: Finished ignition-setup.service. Apr 12 18:31:31.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.024393 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:31:31.054929 kernel: kauditd_printk_skb: 17 callbacks suppressed Apr 12 18:31:31.054950 kernel: audit: type=1130 audit(1712946691.023:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.047340 systemd-networkd[803]: eth0: Gained IPv6LL Apr 12 18:31:34.405586 ignition[827]: Ignition 2.14.0 Apr 12 18:31:34.409131 ignition[827]: Stage: fetch-offline Apr 12 18:31:34.409240 ignition[827]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:34.409268 ignition[827]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:34.503165 ignition[827]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:34.503341 ignition[827]: parsed url from cmdline: "" Apr 12 18:31:34.510800 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:31:34.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.503345 ignition[827]: no config URL provided Apr 12 18:31:34.544098 kernel: audit: type=1130 audit(1712946694.516:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.539058 systemd[1]: Starting ignition-fetch.service... Apr 12 18:31:34.503350 ignition[827]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:31:34.503358 ignition[827]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:31:34.503363 ignition[827]: failed to fetch config: resource requires networking Apr 12 18:31:34.503663 ignition[827]: Ignition finished successfully Apr 12 18:31:34.550589 ignition[833]: Ignition 2.14.0 Apr 12 18:31:34.550596 ignition[833]: Stage: fetch Apr 12 18:31:34.550691 ignition[833]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:34.550710 ignition[833]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:34.557539 ignition[833]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:34.564798 ignition[833]: parsed url from cmdline: "" Apr 12 18:31:34.564807 ignition[833]: no config URL provided Apr 12 18:31:34.564816 ignition[833]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:31:34.564838 ignition[833]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:31:34.606017 unknown[833]: fetched base config from "system" Apr 12 18:31:34.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.564878 ignition[833]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Apr 12 18:31:34.659299 kernel: audit: type=1130 audit(1712946694.621:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.606024 unknown[833]: fetched base config from "system" Apr 12 18:31:34.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.585694 ignition[833]: GET result: OK Apr 12 18:31:34.701439 kernel: audit: type=1130 audit(1712946694.668:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.606030 unknown[833]: fetched user config from "azure" Apr 12 18:31:34.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.585753 ignition[833]: config has been read from IMDS userdata Apr 12 18:31:34.612504 systemd[1]: Finished ignition-fetch.service. Apr 12 18:31:34.585784 ignition[833]: parsing config with SHA512: 43a65f97f21600de4419f5e2e6b40782618c27628a84b0c00a74c055476bc9b5dd3896f80c640e2752670cada5e15d3eab0b28afd1f6540850f74446f33832f5 Apr 12 18:31:34.644321 systemd[1]: Starting ignition-kargs.service... Apr 12 18:31:34.756483 kernel: audit: type=1130 audit(1712946694.706:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.606652 ignition[833]: fetch: fetch complete Apr 12 18:31:34.663893 systemd[1]: Finished ignition-kargs.service. Apr 12 18:31:34.606658 ignition[833]: fetch: fetch passed Apr 12 18:31:34.687397 systemd[1]: Starting ignition-disks.service... Apr 12 18:31:34.606704 ignition[833]: Ignition finished successfully Apr 12 18:31:34.701477 systemd[1]: Finished ignition-disks.service. Apr 12 18:31:34.655826 ignition[839]: Ignition 2.14.0 Apr 12 18:31:34.706647 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:31:34.655833 ignition[839]: Stage: kargs Apr 12 18:31:34.733622 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:34.655938 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:34.743385 systemd[1]: Reached target local-fs.target. Apr 12 18:31:34.655959 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:34.752019 systemd[1]: Reached target sysinit.target. Apr 12 18:31:34.658520 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:34.761116 systemd[1]: Reached target basic.target. Apr 12 18:31:34.660224 ignition[839]: kargs: kargs passed Apr 12 18:31:34.773964 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:31:34.660274 ignition[839]: Ignition finished successfully Apr 12 18:31:34.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.885660 systemd-fsck[854]: ROOT: clean, 612/7326000 files, 481074/7359488 blocks Apr 12 18:31:34.892083 kernel: audit: type=1130 audit(1712946694.865:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:34.693329 ignition[845]: Ignition 2.14.0 Apr 12 18:31:34.858645 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:31:34.693335 ignition[845]: Stage: disks Apr 12 18:31:34.878481 systemd[1]: Mounting sysroot.mount... Apr 12 18:31:34.921277 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:31:34.693427 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:34.918552 systemd[1]: Mounted sysroot.mount. Apr 12 18:31:34.693446 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:34.925448 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:31:34.698282 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:34.699849 ignition[845]: disks: disks passed Apr 12 18:31:34.700660 ignition[845]: Ignition finished successfully Apr 12 18:31:34.988753 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:31:34.997039 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 18:31:35.003066 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:31:35.003104 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:31:35.014276 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:31:35.086884 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:35.092654 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:31:35.117228 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) Apr 12 18:31:35.124429 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:31:35.140759 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:35.140781 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:35.140791 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:35.145912 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:35.159337 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:31:35.186262 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:31:35.197089 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:31:35.847645 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:31:35.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:35.873831 systemd[1]: Starting ignition-mount.service... Apr 12 18:31:35.885891 kernel: audit: type=1130 audit(1712946695.852:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:35.883989 systemd[1]: Starting sysroot-boot.service... Apr 12 18:31:35.890622 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:35.890733 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:35.909351 ignition[930]: INFO : Ignition 2.14.0 Apr 12 18:31:35.909351 ignition[930]: INFO : Stage: mount Apr 12 18:31:35.920271 ignition[930]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:35.920271 ignition[930]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:35.920271 ignition[930]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:35.920271 ignition[930]: INFO : mount: mount passed Apr 12 18:31:35.920271 ignition[930]: INFO : Ignition finished successfully Apr 12 18:31:36.003313 kernel: audit: type=1130 audit(1712946695.933:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:36.003336 kernel: audit: type=1130 audit(1712946695.981:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:35.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:35.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:35.915947 systemd[1]: Finished ignition-mount.service. Apr 12 18:31:35.976684 systemd[1]: Finished sysroot-boot.service. Apr 12 18:31:36.789948 coreos-metadata[864]: Apr 12 18:31:36.789 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:31:36.798911 coreos-metadata[864]: Apr 12 18:31:36.798 INFO Fetch successful Apr 12 18:31:36.832437 coreos-metadata[864]: Apr 12 18:31:36.832 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:31:36.844987 coreos-metadata[864]: Apr 12 18:31:36.844 INFO Fetch successful Apr 12 18:31:36.872657 coreos-metadata[864]: Apr 12 18:31:36.872 INFO wrote hostname ci-3510.3.3-a-55c15aa841 to /sysroot/etc/hostname Apr 12 18:31:36.881718 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 18:31:36.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:36.888270 systemd[1]: Starting ignition-files.service... Apr 12 18:31:36.918766 kernel: audit: type=1130 audit(1712946696.887:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:36.920057 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:36.939205 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) Apr 12 18:31:36.951777 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:36.951809 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:36.958214 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:36.962451 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:36.979325 ignition[962]: INFO : Ignition 2.14.0 Apr 12 18:31:36.979325 ignition[962]: INFO : Stage: files Apr 12 18:31:36.990851 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:36.990851 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:36.990851 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:36.990851 ignition[962]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:31:37.026915 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:31:37.026915 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:31:37.117679 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:31:37.125813 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:31:37.151077 unknown[962]: wrote ssh authorized keys file for user: core Apr 12 18:31:37.156770 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:31:37.156770 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:37.156770 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:31:37.629067 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:31:37.900521 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:31:37.900521 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:37.900521 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:37.900521 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:38.266232 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:31:38.404504 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:31:38.422136 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:38.422136 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:38.422136 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:31:38.615324 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:31:38.907724 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 18:31:38.924922 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:38.924922 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:38.924922 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:31:38.976260 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:31:39.602233 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:39.619239 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:39.771216 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (965) Apr 12 18:31:39.771241 kernel: audit: type=1130 audit(1712946699.699:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem130505574" Apr 12 18:31:39.771295 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem130505574": device or resource busy Apr 12 18:31:39.771295 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem130505574", trying btrfs: device or resource busy Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem130505574" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem130505574" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem130505574" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem130505574" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem317709020" Apr 12 18:31:39.771295 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem317709020": device or resource busy Apr 12 18:31:39.771295 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem317709020", trying btrfs: device or resource busy Apr 12 18:31:39.771295 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem317709020" Apr 12 18:31:40.069142 kernel: audit: type=1130 audit(1712946699.788:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.069172 kernel: audit: type=1131 audit(1712946699.788:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.069201 kernel: audit: type=1130 audit(1712946699.841:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.069212 kernel: audit: type=1130 audit(1712946699.959:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.069221 kernel: audit: type=1131 audit(1712946699.989:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.658297 systemd[1]: mnt-oem130505574.mount: Deactivated successfully. Apr 12 18:31:40.080337 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem317709020" Apr 12 18:31:40.080337 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem317709020" Apr 12 18:31:40.080337 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem317709020" Apr 12 18:31:40.080337 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(12): [started] processing unit "waagent.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(12): [finished] processing unit "waagent.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(13): [started] processing unit "nvidia.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(13): [finished] processing unit "nvidia.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Apr 12 18:31:40.080337 ignition[962]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:31:40.387114 kernel: audit: type=1130 audit(1712946700.118:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.387144 kernel: audit: type=1131 audit(1712946700.234:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.694251 systemd[1]: Finished ignition-files.service. Apr 12 18:31:40.400659 ignition[962]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:40.400659 ignition[962]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:40.400659 ignition[962]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:40.400659 ignition[962]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:40.400659 ignition[962]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:40.400659 ignition[962]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:40.400659 ignition[962]: INFO : files: files passed Apr 12 18:31:40.400659 ignition[962]: INFO : Ignition finished successfully Apr 12 18:31:40.533514 kernel: audit: type=1131 audit(1712946700.405:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.533685 initrd-setup-root-after-ignition[987]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:31:40.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.727862 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:31:40.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.733375 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:31:40.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.734317 systemd[1]: Starting ignition-quench.service... Apr 12 18:31:40.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.759657 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:31:40.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.760690 systemd[1]: Finished ignition-quench.service. Apr 12 18:31:40.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.824481 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:31:40.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.876013 systemd[1]: Reached target ignition-complete.target. Apr 12 18:31:40.628488 ignition[1000]: INFO : Ignition 2.14.0 Apr 12 18:31:40.628488 ignition[1000]: INFO : Stage: umount Apr 12 18:31:40.628488 ignition[1000]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:40.628488 ignition[1000]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:40.628488 ignition[1000]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:40.628488 ignition[1000]: INFO : umount: umount passed Apr 12 18:31:40.628488 ignition[1000]: INFO : Ignition finished successfully Apr 12 18:31:40.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.905178 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:31:39.945452 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:31:40.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:39.945586 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:31:39.989573 systemd[1]: Reached target initrd-fs.target. Apr 12 18:31:40.005469 systemd[1]: Reached target initrd.target. Apr 12 18:31:40.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.041266 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:31:40.055907 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:31:40.104120 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:31:40.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.155576 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:31:40.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.176151 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:31:40.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.186712 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:31:40.199911 systemd[1]: Stopped target timers.target. Apr 12 18:31:40.216871 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:31:40.823000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:31:40.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.216950 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:31:40.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.262115 systemd[1]: Stopped target initrd.target. Apr 12 18:31:40.281019 systemd[1]: Stopped target basic.target. Apr 12 18:31:40.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.285843 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:31:40.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.291409 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:31:40.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.309242 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:31:40.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.327426 systemd[1]: Stopped target remote-fs.target. Apr 12 18:31:40.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.920199 kernel: hv_netvsc 002248b6-4523-0022-48b6-4523002248b6 eth0: Data path switched from VF: enP64609s1 Apr 12 18:31:40.339673 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:31:40.353142 systemd[1]: Stopped target sysinit.target. Apr 12 18:31:40.366626 systemd[1]: Stopped target local-fs.target. Apr 12 18:31:40.379024 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:31:40.392054 systemd[1]: Stopped target swap.target. Apr 12 18:31:40.396513 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:31:40.396583 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:31:40.434073 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:31:40.447938 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:31:40.448000 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:31:40.462087 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:31:40.462127 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:31:40.476624 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:31:40.476665 systemd[1]: Stopped ignition-files.service. Apr 12 18:31:40.492360 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 18:31:40.492401 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 18:31:40.509326 systemd[1]: Stopping ignition-mount.service... Apr 12 18:31:40.517403 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:31:40.517472 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:31:40.523567 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:31:40.537517 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:31:40.537596 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:31:40.543991 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:31:40.544053 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:31:40.559159 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:31:41.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.559286 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:31:40.569581 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:31:40.569681 systemd[1]: Stopped ignition-mount.service. Apr 12 18:31:40.585200 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:31:40.585253 systemd[1]: Stopped ignition-disks.service. Apr 12 18:31:40.594153 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:31:40.594211 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:31:40.604256 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:31:40.604302 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:31:40.613121 systemd[1]: Stopped target network.target. Apr 12 18:31:40.623676 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:31:40.623732 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:31:40.633544 systemd[1]: Stopped target paths.target. Apr 12 18:31:40.642163 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:31:40.646230 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:31:40.658596 systemd[1]: Stopped target slices.target. Apr 12 18:31:40.678594 systemd[1]: Stopped target sockets.target. Apr 12 18:31:40.690518 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:31:40.690555 systemd[1]: Closed iscsid.socket. Apr 12 18:31:40.699019 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:31:40.699046 systemd[1]: Closed iscsiuio.socket. Apr 12 18:31:40.708008 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:31:40.708053 systemd[1]: Stopped ignition-setup.service. Apr 12 18:31:40.718485 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:31:40.728188 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:31:40.736623 systemd-networkd[803]: eth0: DHCPv6 lease lost Apr 12 18:31:41.175000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:31:40.738167 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:31:40.738463 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:31:40.748427 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:31:40.748465 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:31:40.758746 systemd[1]: Stopping network-cleanup.service... Apr 12 18:31:40.770391 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:31:40.770470 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:31:40.780312 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:31:40.780366 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:31:40.793475 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:31:40.793520 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:31:40.798762 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:31:40.808400 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:31:40.808991 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:31:40.809091 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:31:40.824975 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:31:40.825111 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:31:40.835992 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:31:40.836048 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:31:40.845362 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:31:41.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.845399 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:31:40.850470 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:31:41.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:40.850521 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:31:40.859563 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:31:40.859607 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:31:40.869494 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:31:40.869537 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:31:40.880228 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:31:40.889633 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:31:40.889693 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:31:40.895985 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:31:41.375622 systemd-journald[236]: Received SIGTERM from PID 1 (n/a). Apr 12 18:31:41.375660 iscsid[812]: iscsid shutting down. Apr 12 18:31:40.896094 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:31:41.034906 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:31:41.035022 systemd[1]: Stopped network-cleanup.service. Apr 12 18:31:41.269888 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:31:41.280490 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:31:41.280588 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:31:41.286858 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:31:41.297592 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:31:41.297652 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:31:41.307539 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:31:41.325095 systemd[1]: Switching root. Apr 12 18:31:41.376015 systemd-journald[236]: Journal stopped Apr 12 18:31:55.904074 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:31:55.904220 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:31:55.904237 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:31:55.904248 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:31:55.904256 kernel: SELinux: policy capability open_perms=1 Apr 12 18:31:55.904264 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:31:55.904273 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:31:55.904339 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:31:55.904351 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:31:55.904361 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:31:55.904371 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:31:55.904380 kernel: kauditd_printk_skb: 32 callbacks suppressed Apr 12 18:31:55.904389 kernel: audit: type=1403 audit(1712946704.156:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:31:55.904399 systemd[1]: Successfully loaded SELinux policy in 398.514ms. Apr 12 18:31:55.904410 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 31.057ms. Apr 12 18:31:55.904422 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:55.904432 systemd[1]: Detected virtualization microsoft. Apr 12 18:31:55.904441 systemd[1]: Detected architecture arm64. Apr 12 18:31:55.904449 systemd[1]: Detected first boot. Apr 12 18:31:55.904459 systemd[1]: Hostname set to . Apr 12 18:31:55.904467 systemd[1]: Initializing machine ID from random generator. Apr 12 18:31:55.904477 kernel: audit: type=1400 audit(1712946705.126:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:55.904488 kernel: audit: type=1400 audit(1712946705.126:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:55.904497 kernel: audit: type=1334 audit(1712946705.145:82): prog-id=10 op=LOAD Apr 12 18:31:55.904505 kernel: audit: type=1334 audit(1712946705.145:83): prog-id=10 op=UNLOAD Apr 12 18:31:55.904513 kernel: audit: type=1334 audit(1712946705.162:84): prog-id=11 op=LOAD Apr 12 18:31:55.904522 kernel: audit: type=1334 audit(1712946705.162:85): prog-id=11 op=UNLOAD Apr 12 18:31:55.904531 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:31:55.904540 kernel: audit: type=1400 audit(1712946706.744:86): avc: denied { associate } for pid=1034 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:55.904551 kernel: audit: type=1300 audit(1712946706.744:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:55.904561 kernel: audit: type=1327 audit(1712946706.744:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:55.904570 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:31:55.904579 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:55.904588 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:55.904598 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:55.904609 kernel: kauditd_printk_skb: 6 callbacks suppressed Apr 12 18:31:55.904618 kernel: audit: type=1334 audit(1712946715.083:88): prog-id=12 op=LOAD Apr 12 18:31:55.904627 kernel: audit: type=1334 audit(1712946715.083:89): prog-id=3 op=UNLOAD Apr 12 18:31:55.904636 kernel: audit: type=1334 audit(1712946715.088:90): prog-id=13 op=LOAD Apr 12 18:31:55.904644 kernel: audit: type=1334 audit(1712946715.094:91): prog-id=14 op=LOAD Apr 12 18:31:55.904655 kernel: audit: type=1334 audit(1712946715.094:92): prog-id=4 op=UNLOAD Apr 12 18:31:55.904668 kernel: audit: type=1334 audit(1712946715.094:93): prog-id=5 op=UNLOAD Apr 12 18:31:55.904678 kernel: audit: type=1334 audit(1712946715.099:94): prog-id=15 op=LOAD Apr 12 18:31:55.904686 kernel: audit: type=1334 audit(1712946715.099:95): prog-id=12 op=UNLOAD Apr 12 18:31:55.904696 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:31:55.904705 kernel: audit: type=1334 audit(1712946715.105:96): prog-id=16 op=LOAD Apr 12 18:31:55.904714 kernel: audit: type=1334 audit(1712946715.110:97): prog-id=17 op=LOAD Apr 12 18:31:55.904723 systemd[1]: Stopped iscsiuio.service. Apr 12 18:31:55.904733 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:31:55.904742 systemd[1]: Stopped iscsid.service. Apr 12 18:31:55.904752 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:31:55.904762 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:31:55.904772 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:31:55.904782 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:31:55.904791 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:31:55.904800 systemd[1]: Created slice system-getty.slice. Apr 12 18:31:55.904809 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:31:55.904820 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:31:55.904830 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:31:55.904839 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:31:55.904849 systemd[1]: Created slice user.slice. Apr 12 18:31:55.904858 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:55.904868 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:31:55.904877 systemd[1]: Set up automount boot.automount. Apr 12 18:31:55.904887 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:31:55.904896 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:31:55.904905 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:31:55.904916 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:31:55.904925 systemd[1]: Reached target integritysetup.target. Apr 12 18:31:55.904934 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:55.904944 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:55.904953 systemd[1]: Reached target slices.target. Apr 12 18:31:55.904963 systemd[1]: Reached target swap.target. Apr 12 18:31:55.904972 systemd[1]: Reached target torcx.target. Apr 12 18:31:55.904983 systemd[1]: Reached target veritysetup.target. Apr 12 18:31:55.904993 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:31:55.905002 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:31:55.905011 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:55.905021 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:55.905030 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:55.905039 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:31:55.905050 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:31:55.905059 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:31:55.905069 systemd[1]: Mounting media.mount... Apr 12 18:31:55.905078 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:31:55.905087 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:31:55.905096 systemd[1]: Mounting tmp.mount... Apr 12 18:31:55.905106 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:31:55.905116 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:31:55.905126 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:55.905137 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:31:55.905147 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:31:55.905156 systemd[1]: Starting modprobe@drm.service... Apr 12 18:31:55.905166 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:31:55.905175 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:31:55.905193 systemd[1]: Starting modprobe@loop.service... Apr 12 18:31:55.905204 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:31:55.905213 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:31:55.905222 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:31:55.905233 kernel: fuse: init (API version 7.34) Apr 12 18:31:55.905243 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:31:55.905252 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:31:55.905261 systemd[1]: Stopped systemd-journald.service. Apr 12 18:31:55.905271 systemd[1]: systemd-journald.service: Consumed 3.385s CPU time. Apr 12 18:31:55.905280 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:55.905290 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:55.905299 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:31:55.905309 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:31:55.905320 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:55.905329 kernel: loop: module loaded Apr 12 18:31:55.905338 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:31:55.905348 systemd[1]: Stopped verity-setup.service. Apr 12 18:31:55.905358 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:31:55.905367 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:31:55.905377 systemd[1]: Mounted media.mount. Apr 12 18:31:55.905386 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:31:55.905395 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:31:55.905406 systemd[1]: Mounted tmp.mount. Apr 12 18:31:55.905418 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:31:55.905429 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:55.905442 systemd-journald[1140]: Journal started Apr 12 18:31:55.905484 systemd-journald[1140]: Runtime Journal (/run/log/journal/7fc3daf6756c44bf8ff906603a2fd835) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:31:44.156000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:31:45.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:45.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:45.145000 audit: BPF prog-id=10 op=LOAD Apr 12 18:31:45.145000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:31:45.162000 audit: BPF prog-id=11 op=LOAD Apr 12 18:31:45.162000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:31:46.744000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:46.744000 audit[1034]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:46.744000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:46.779000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:46.779000 audit[1034]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:46.779000 audit: CWD cwd="/" Apr 12 18:31:46.779000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:46.779000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:46.779000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:55.083000 audit: BPF prog-id=12 op=LOAD Apr 12 18:31:55.083000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:31:55.088000 audit: BPF prog-id=13 op=LOAD Apr 12 18:31:55.094000 audit: BPF prog-id=14 op=LOAD Apr 12 18:31:55.094000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:31:55.094000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:31:55.099000 audit: BPF prog-id=15 op=LOAD Apr 12 18:31:55.099000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:31:55.105000 audit: BPF prog-id=16 op=LOAD Apr 12 18:31:55.110000 audit: BPF prog-id=17 op=LOAD Apr 12 18:31:55.110000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:31:55.110000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:31:55.116000 audit: BPF prog-id=18 op=LOAD Apr 12 18:31:55.116000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:31:55.122000 audit: BPF prog-id=19 op=LOAD Apr 12 18:31:55.128000 audit: BPF prog-id=20 op=LOAD Apr 12 18:31:55.128000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:31:55.128000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:31:55.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.152000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:31:55.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.744000 audit: BPF prog-id=21 op=LOAD Apr 12 18:31:55.744000 audit: BPF prog-id=22 op=LOAD Apr 12 18:31:55.744000 audit: BPF prog-id=23 op=LOAD Apr 12 18:31:55.744000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:31:55.744000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:31:55.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.901000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:31:55.901000 audit[1140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffdcd0c7e0 a2=4000 a3=1 items=0 ppid=1 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:55.901000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:31:46.673325 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:55.082090 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:31:46.690778 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:55.128735 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:31:46.690811 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:55.129098 systemd[1]: systemd-journald.service: Consumed 3.385s CPU time. Apr 12 18:31:46.690855 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:31:46.690865 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:31:46.690894 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:31:46.690906 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:31:46.691095 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:31:46.691127 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:46.691138 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:46.725330 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:31:46.725400 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:31:46.725422 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:31:46.725436 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:31:46.725457 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:31:46.725470 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:31:53.673007 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:53.673274 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:53.673367 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:53.673523 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:53.673568 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:31:53.673621 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-04-12T18:31:53Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:31:55.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.916543 systemd[1]: Started systemd-journald.service. Apr 12 18:31:55.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.920018 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:31:55.920155 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:31:55.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.925520 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:31:55.925640 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:31:55.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.930412 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:31:55.930529 systemd[1]: Finished modprobe@drm.service. Apr 12 18:31:55.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.935031 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:31:55.935149 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:31:55.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.940198 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:31:55.940318 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:31:55.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.945149 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:31:55.945278 systemd[1]: Finished modprobe@loop.service. Apr 12 18:31:55.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.949870 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:31:55.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.955343 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:31:55.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:55.960450 systemd[1]: Reached target network-pre.target. Apr 12 18:31:55.966171 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:31:55.972162 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:31:55.976332 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:31:55.994246 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:31:55.999975 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:31:56.004336 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:31:56.005408 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:31:56.009721 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:31:56.010821 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:31:56.018039 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:56.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:56.023230 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:31:56.028607 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:31:56.033371 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:56.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:56.039464 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:56.044543 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:31:56.051825 udevadm[1154]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:31:56.070682 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:31:56.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:56.075582 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:31:56.088151 systemd-journald[1140]: Time spent on flushing to /var/log/journal/7fc3daf6756c44bf8ff906603a2fd835 is 13.759ms for 1117 entries. Apr 12 18:31:56.088151 systemd-journald[1140]: System Journal (/var/log/journal/7fc3daf6756c44bf8ff906603a2fd835) is 8.0M, max 2.6G, 2.6G free. Apr 12 18:31:56.169176 systemd-journald[1140]: Received client request to flush runtime journal. Apr 12 18:31:56.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:56.154784 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:56.170144 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:31:56.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:56.780659 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:31:56.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:57.340216 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:31:57.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:57.345000 audit: BPF prog-id=24 op=LOAD Apr 12 18:31:57.345000 audit: BPF prog-id=25 op=LOAD Apr 12 18:31:57.345000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:31:57.345000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:31:57.346725 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:57.364437 systemd-udevd[1157]: Using default interface naming scheme 'v252'. Apr 12 18:31:57.791574 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:57.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:57.801000 audit: BPF prog-id=26 op=LOAD Apr 12 18:31:57.803764 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:57.822262 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:31:57.894000 audit[1166]: AVC avc: denied { confidentiality } for pid=1166 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:31:57.910202 kernel: hv_vmbus: registering driver hv_balloon Apr 12 18:31:57.910301 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Apr 12 18:31:57.910334 kernel: hv_balloon: Memory hot add disabled on ARM64 Apr 12 18:31:57.928680 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:31:57.928752 kernel: hv_utils: Registering HyperV Utility Driver Apr 12 18:31:57.924000 audit: BPF prog-id=27 op=LOAD Apr 12 18:31:57.924000 audit: BPF prog-id=28 op=LOAD Apr 12 18:31:57.924000 audit: BPF prog-id=29 op=LOAD Apr 12 18:31:57.925577 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:31:57.894000 audit[1166]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafeb0bc90 a1=aa2c a2=ffff820624b0 a3=aaaafea6a010 items=12 ppid=1157 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:57.894000 audit: CWD cwd="/" Apr 12 18:31:57.894000 audit: PATH item=0 name=(null) inode=6462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=1 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=2 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=3 name=(null) inode=8105 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=4 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=5 name=(null) inode=8106 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=6 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=7 name=(null) inode=8107 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=8 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=9 name=(null) inode=8108 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=10 name=(null) inode=8104 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PATH item=11 name=(null) inode=8109 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:57.894000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:31:57.950071 kernel: hv_vmbus: registering driver hv_utils Apr 12 18:31:57.958239 kernel: hv_utils: Heartbeat IC version 3.0 Apr 12 18:31:57.969203 kernel: hv_utils: Shutdown IC version 3.2 Apr 12 18:31:57.969265 kernel: hv_vmbus: registering driver hyperv_fb Apr 12 18:31:57.969280 kernel: hv_utils: TimeSync IC version 4.0 Apr 12 18:31:57.852808 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Apr 12 18:31:57.913649 systemd-journald[1140]: Time jumped backwards, rotating. Apr 12 18:31:57.913733 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Apr 12 18:31:57.913746 kernel: Console: switching to colour dummy device 80x25 Apr 12 18:31:57.913761 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:31:57.940950 systemd[1]: Started systemd-userdbd.service. Apr 12 18:31:57.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.061600 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1176) Apr 12 18:31:58.081866 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:58.087867 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:31:58.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.094144 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:31:58.381664 systemd-networkd[1178]: lo: Link UP Apr 12 18:31:58.381675 systemd-networkd[1178]: lo: Gained carrier Apr 12 18:31:58.382062 systemd-networkd[1178]: Enumeration completed Apr 12 18:31:58.382232 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:58.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.388326 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:31:58.402880 lvm[1233]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:58.414114 systemd-networkd[1178]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:58.449396 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:31:58.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.454518 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:58.460430 systemd[1]: Starting lvm2-activation.service... Apr 12 18:31:58.464723 lvm[1236]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:58.470597 kernel: mlx5_core fc61:00:02.0 enP64609s1: Link up Apr 12 18:31:58.482430 systemd[1]: Finished lvm2-activation.service. Apr 12 18:31:58.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.487213 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:58.498625 kernel: hv_netvsc 002248b6-4523-0022-48b6-4523002248b6 eth0: Data path switched to VF: enP64609s1 Apr 12 18:31:58.498760 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:31:58.498788 systemd[1]: Reached target local-fs.target. Apr 12 18:31:58.499364 systemd-networkd[1178]: enP64609s1: Link UP Apr 12 18:31:58.499530 systemd-networkd[1178]: eth0: Link UP Apr 12 18:31:58.499682 systemd-networkd[1178]: eth0: Gained carrier Apr 12 18:31:58.503610 systemd[1]: Reached target machines.target. Apr 12 18:31:58.509119 systemd[1]: Starting ldconfig.service... Apr 12 18:31:58.510109 systemd-networkd[1178]: enP64609s1: Gained carrier Apr 12 18:31:58.512948 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:31:58.513043 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:58.514117 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:31:58.519164 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:31:58.524681 systemd-networkd[1178]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:58.525300 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:31:58.529920 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:58.529982 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:58.530945 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:31:58.572750 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1239 (bootctl) Apr 12 18:31:58.573883 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:31:58.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.817212 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:31:58.918581 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:31:58.919956 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:31:58.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:58.976870 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:31:59.185062 systemd-fsck[1249]: fsck.fat 4.2 (2021-01-31) Apr 12 18:31:59.185062 systemd-fsck[1249]: /dev/sda1: 236 files, 117047/258078 clusters Apr 12 18:31:59.186745 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:31:59.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:59.197065 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:31:59.197627 systemd[1]: Mounting boot.mount... Apr 12 18:31:59.205690 systemd[1]: Mounted boot.mount. Apr 12 18:31:59.220110 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:31:59.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:59.340719 systemd-tmpfiles[1242]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:31:59.948823 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:31:59.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:59.955391 systemd[1]: Starting audit-rules.service... Apr 12 18:31:59.960218 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:31:59.965888 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:31:59.970000 audit: BPF prog-id=30 op=LOAD Apr 12 18:31:59.972309 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:59.975408 kernel: kauditd_printk_skb: 86 callbacks suppressed Apr 12 18:31:59.975474 kernel: audit: type=1334 audit(1712946719.970:167): prog-id=30 op=LOAD Apr 12 18:31:59.986000 audit: BPF prog-id=31 op=LOAD Apr 12 18:31:59.987953 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:31:59.995598 kernel: audit: type=1334 audit(1712946719.986:168): prog-id=31 op=LOAD Apr 12 18:31:59.997199 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:32:00.072801 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:32:00.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.077972 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:32:00.098718 kernel: audit: type=1130 audit(1712946720.077:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.100528 kernel: audit: type=1127 audit(1712946720.098:170): pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.098000 audit[1261]: SYSTEM_BOOT pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.117299 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:32:00.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.138729 kernel: audit: type=1130 audit(1712946720.121:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.138986 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:32:00.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.143774 systemd[1]: Reached target time-set.target. Apr 12 18:32:00.160820 kernel: audit: type=1130 audit(1712946720.143:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.197719 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:32:00.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.220575 kernel: audit: type=1130 audit(1712946720.202:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.220608 systemd-resolved[1258]: Positive Trust Anchors: Apr 12 18:32:00.220615 systemd-resolved[1258]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:32:00.220641 systemd-resolved[1258]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:32:00.224155 systemd-resolved[1258]: Using system hostname 'ci-3510.3.3-a-55c15aa841'. Apr 12 18:32:00.225459 systemd[1]: Started systemd-resolved.service. Apr 12 18:32:00.229921 systemd[1]: Reached target network.target. Apr 12 18:32:00.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.250076 systemd[1]: Reached target nss-lookup.target. Apr 12 18:32:00.251579 kernel: audit: type=1130 audit(1712946720.229:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.464673 systemd-networkd[1178]: eth0: Gained IPv6LL Apr 12 18:32:00.466232 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:32:00.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.471786 systemd[1]: Reached target network-online.target. Apr 12 18:32:00.494321 kernel: audit: type=1130 audit(1712946720.471:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:00.519704 systemd-timesyncd[1260]: Contacted time server 204.2.134.162:123 (0.flatcar.pool.ntp.org). Apr 12 18:32:00.520053 systemd-timesyncd[1260]: Initial clock synchronization to Fri 2024-04-12 18:32:00.518956 UTC. Apr 12 18:32:00.631000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:32:00.631000 audit[1276]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff617e560 a2=420 a3=0 items=0 ppid=1255 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:00.631000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:32:00.643565 kernel: audit: type=1305 audit(1712946720.631:176): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:32:00.643607 augenrules[1276]: No rules Apr 12 18:32:00.644534 systemd[1]: Finished audit-rules.service. Apr 12 18:32:08.782338 ldconfig[1238]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:32:08.792847 systemd[1]: Finished ldconfig.service. Apr 12 18:32:08.798667 systemd[1]: Starting systemd-update-done.service... Apr 12 18:32:08.845638 systemd[1]: Finished systemd-update-done.service. Apr 12 18:32:08.850587 systemd[1]: Reached target sysinit.target. Apr 12 18:32:08.854905 systemd[1]: Started motdgen.path. Apr 12 18:32:08.858511 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:32:08.865190 systemd[1]: Started logrotate.timer. Apr 12 18:32:08.869145 systemd[1]: Started mdadm.timer. Apr 12 18:32:08.872705 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:32:08.877282 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:32:08.877316 systemd[1]: Reached target paths.target. Apr 12 18:32:08.881407 systemd[1]: Reached target timers.target. Apr 12 18:32:08.886090 systemd[1]: Listening on dbus.socket. Apr 12 18:32:08.891058 systemd[1]: Starting docker.socket... Apr 12 18:32:08.915559 systemd[1]: Listening on sshd.socket. Apr 12 18:32:08.919545 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:32:08.920055 systemd[1]: Listening on docker.socket. Apr 12 18:32:08.924123 systemd[1]: Reached target sockets.target. Apr 12 18:32:08.928369 systemd[1]: Reached target basic.target. Apr 12 18:32:08.932385 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:32:08.932412 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:32:08.933492 systemd[1]: Starting containerd.service... Apr 12 18:32:08.938150 systemd[1]: Starting dbus.service... Apr 12 18:32:08.942396 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:32:08.947930 systemd[1]: Starting extend-filesystems.service... Apr 12 18:32:08.954691 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:32:08.955907 systemd[1]: Starting motdgen.service... Apr 12 18:32:08.960722 systemd[1]: Started nvidia.service. Apr 12 18:32:08.966122 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:32:08.971607 systemd[1]: Starting prepare-critools.service... Apr 12 18:32:08.976788 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:32:08.982232 systemd[1]: Starting sshd-keygen.service... Apr 12 18:32:08.988080 systemd[1]: Starting systemd-logind.service... Apr 12 18:32:08.992243 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:32:08.992300 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:32:08.993632 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:32:08.994541 systemd[1]: Starting update-engine.service... Apr 12 18:32:09.000350 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:32:09.009903 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:32:09.010086 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:32:09.035842 extend-filesystems[1287]: Found sda Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda1 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda2 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda3 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found usr Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda4 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda6 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda7 Apr 12 18:32:09.040514 extend-filesystems[1287]: Found sda9 Apr 12 18:32:09.040514 extend-filesystems[1287]: Checking size of /dev/sda9 Apr 12 18:32:09.077391 jq[1286]: false Apr 12 18:32:09.077601 jq[1304]: true Apr 12 18:32:09.108423 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:32:09.108618 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:32:09.109718 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:32:09.109885 systemd[1]: Finished motdgen.service. Apr 12 18:32:09.146939 systemd-logind[1299]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Apr 12 18:32:09.155869 jq[1315]: true Apr 12 18:32:09.152317 systemd-logind[1299]: New seat seat0. Apr 12 18:32:09.174652 env[1311]: time="2024-04-12T18:32:09.174598803Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:32:09.184135 tar[1306]: ./ Apr 12 18:32:09.184135 tar[1306]: ./loopback Apr 12 18:32:09.185066 tar[1307]: crictl Apr 12 18:32:09.228901 extend-filesystems[1287]: Old size kept for /dev/sda9 Apr 12 18:32:09.236877 extend-filesystems[1287]: Found sr0 Apr 12 18:32:09.229510 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:32:09.269886 tar[1306]: ./bandwidth Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.253892860Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.254069296Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.256829353Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.256863832Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257098747Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257116306Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257129226Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257138586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257209104Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270016 env[1311]: time="2024-04-12T18:32:09.257419619Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:09.229729 systemd[1]: Finished extend-filesystems.service. Apr 12 18:32:09.270265 env[1311]: time="2024-04-12T18:32:09.257526497Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:09.270265 env[1311]: time="2024-04-12T18:32:09.257541096Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:32:09.270265 env[1311]: time="2024-04-12T18:32:09.257622014Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:32:09.270265 env[1311]: time="2024-04-12T18:32:09.257635134Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:32:09.279164 env[1311]: time="2024-04-12T18:32:09.279101361Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:32:09.279300 env[1311]: time="2024-04-12T18:32:09.279177919Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:32:09.279300 env[1311]: time="2024-04-12T18:32:09.279193519Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:32:09.279300 env[1311]: time="2024-04-12T18:32:09.279284157Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279365 env[1311]: time="2024-04-12T18:32:09.279303156Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279365 env[1311]: time="2024-04-12T18:32:09.279331915Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279365 env[1311]: time="2024-04-12T18:32:09.279346675Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279822 env[1311]: time="2024-04-12T18:32:09.279788065Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279822 env[1311]: time="2024-04-12T18:32:09.279814584Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279912 env[1311]: time="2024-04-12T18:32:09.279828544Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279912 env[1311]: time="2024-04-12T18:32:09.279853503Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.279912 env[1311]: time="2024-04-12T18:32:09.279869623Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:32:09.280068 env[1311]: time="2024-04-12T18:32:09.280038739Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:32:09.280157 env[1311]: time="2024-04-12T18:32:09.280134297Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:32:09.280584 env[1311]: time="2024-04-12T18:32:09.280423570Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:32:09.280584 env[1311]: time="2024-04-12T18:32:09.280469929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280584 env[1311]: time="2024-04-12T18:32:09.280485809Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280542768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280617886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280641445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280654845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280666445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280688 env[1311]: time="2024-04-12T18:32:09.280679964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280798 env[1311]: time="2024-04-12T18:32:09.280691124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280798 env[1311]: time="2024-04-12T18:32:09.280703524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280798 env[1311]: time="2024-04-12T18:32:09.280728323Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:32:09.280909 env[1311]: time="2024-04-12T18:32:09.280877160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280909 env[1311]: time="2024-04-12T18:32:09.280902959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280959 env[1311]: time="2024-04-12T18:32:09.280916879Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.280959 env[1311]: time="2024-04-12T18:32:09.280929799Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:32:09.280996 env[1311]: time="2024-04-12T18:32:09.280944278Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:32:09.280996 env[1311]: time="2024-04-12T18:32:09.280967998Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:32:09.280996 env[1311]: time="2024-04-12T18:32:09.280986037Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:32:09.281060 env[1311]: time="2024-04-12T18:32:09.281019997Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:32:09.281328 env[1311]: time="2024-04-12T18:32:09.281254231Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:32:09.281328 env[1311]: time="2024-04-12T18:32:09.281324830Z" level=info msg="Connect containerd service" Apr 12 18:32:09.282820 systemd[1]: Started containerd.service. Apr 12 18:32:09.319789 bash[1354]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.281362869Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282041733Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282129811Z" level=info msg="Start subscribing containerd event" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282168090Z" level=info msg="Start recovering state" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282229249Z" level=info msg="Start event monitor" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282248528Z" level=info msg="Start snapshots syncer" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282257368Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282264808Z" level=info msg="Start streaming server" Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282605200Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282660719Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:32:09.319865 env[1311]: time="2024-04-12T18:32:09.282722878Z" level=info msg="containerd successfully booted in 0.110038s" Apr 12 18:32:09.307995 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:32:09.323712 dbus-daemon[1285]: [system] SELinux support is enabled Apr 12 18:32:09.323884 systemd[1]: Started dbus.service. Apr 12 18:32:09.329352 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:32:09.329375 systemd[1]: Reached target system-config.target. Apr 12 18:32:09.336946 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:32:09.336968 systemd[1]: Reached target user-config.target. Apr 12 18:32:09.344772 systemd[1]: Started systemd-logind.service. Apr 12 18:32:09.385096 tar[1306]: ./ptp Apr 12 18:32:09.401446 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:32:09.468705 tar[1306]: ./vlan Apr 12 18:32:09.508899 tar[1306]: ./host-device Apr 12 18:32:09.547293 tar[1306]: ./tuning Apr 12 18:32:09.581324 tar[1306]: ./vrf Apr 12 18:32:09.618005 tar[1306]: ./sbr Apr 12 18:32:09.655341 tar[1306]: ./tap Apr 12 18:32:09.694118 tar[1306]: ./dhcp Apr 12 18:32:09.792698 tar[1306]: ./static Apr 12 18:32:09.820863 tar[1306]: ./firewall Apr 12 18:32:09.864207 tar[1306]: ./macvlan Apr 12 18:32:09.903815 tar[1306]: ./dummy Apr 12 18:32:09.910219 update_engine[1303]: I0412 18:32:09.891280 1303 main.cc:92] Flatcar Update Engine starting Apr 12 18:32:09.943146 tar[1306]: ./bridge Apr 12 18:32:09.988717 tar[1306]: ./ipvlan Apr 12 18:32:09.992125 systemd[1]: Started update-engine.service. Apr 12 18:32:09.999730 systemd[1]: Started locksmithd.service. Apr 12 18:32:10.004238 update_engine[1303]: I0412 18:32:09.998603 1303 update_check_scheduler.cc:74] Next update check in 10m23s Apr 12 18:32:10.017242 systemd[1]: Finished prepare-critools.service. Apr 12 18:32:10.046770 tar[1306]: ./portmap Apr 12 18:32:10.078259 tar[1306]: ./host-local Apr 12 18:32:10.188309 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:32:11.858802 locksmithd[1392]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:32:13.119050 sshd_keygen[1300]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:32:13.136914 systemd[1]: Finished sshd-keygen.service. Apr 12 18:32:13.143452 systemd[1]: Starting issuegen.service... Apr 12 18:32:13.148299 systemd[1]: Started waagent.service. Apr 12 18:32:13.152983 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:32:13.153153 systemd[1]: Finished issuegen.service. Apr 12 18:32:13.158691 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:32:13.180782 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:32:13.187227 systemd[1]: Started getty@tty1.service. Apr 12 18:32:13.192811 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:32:13.197649 systemd[1]: Reached target getty.target. Apr 12 18:32:13.201773 systemd[1]: Reached target multi-user.target. Apr 12 18:32:13.207512 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:32:13.219774 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:32:13.219939 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:32:13.225252 systemd[1]: Startup finished in 694ms (kernel) + 16.900s (initrd) + 29.820s (userspace) = 47.415s. Apr 12 18:32:14.111182 login[1413]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 18:32:14.129273 login[1414]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:32:14.172356 systemd[1]: Created slice user-500.slice. Apr 12 18:32:14.173429 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:32:14.175596 systemd-logind[1299]: New session 1 of user core. Apr 12 18:32:14.219312 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:32:14.220753 systemd[1]: Starting user@500.service... Apr 12 18:32:14.263208 (systemd)[1417]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:14.956781 systemd[1417]: Queued start job for default target default.target. Apr 12 18:32:14.957268 systemd[1417]: Reached target paths.target. Apr 12 18:32:14.957287 systemd[1417]: Reached target sockets.target. Apr 12 18:32:14.957298 systemd[1417]: Reached target timers.target. Apr 12 18:32:14.957307 systemd[1417]: Reached target basic.target. Apr 12 18:32:14.957351 systemd[1417]: Reached target default.target. Apr 12 18:32:14.957376 systemd[1417]: Startup finished in 688ms. Apr 12 18:32:14.957421 systemd[1]: Started user@500.service. Apr 12 18:32:14.958385 systemd[1]: Started session-1.scope. Apr 12 18:32:15.111568 login[1413]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:32:15.114946 systemd-logind[1299]: New session 2 of user core. Apr 12 18:32:15.115755 systemd[1]: Started session-2.scope. Apr 12 18:32:20.664689 waagent[1410]: 2024-04-12T18:32:20.664573Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Apr 12 18:32:20.671219 waagent[1410]: 2024-04-12T18:32:20.671134Z INFO Daemon Daemon OS: flatcar 3510.3.3 Apr 12 18:32:20.675777 waagent[1410]: 2024-04-12T18:32:20.675714Z INFO Daemon Daemon Python: 3.9.16 Apr 12 18:32:20.682734 waagent[1410]: 2024-04-12T18:32:20.682655Z INFO Daemon Daemon Run daemon Apr 12 18:32:20.687096 waagent[1410]: 2024-04-12T18:32:20.687035Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.3' Apr 12 18:32:20.703871 waagent[1410]: 2024-04-12T18:32:20.703750Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:32:20.718629 waagent[1410]: 2024-04-12T18:32:20.718470Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:32:20.728261 waagent[1410]: 2024-04-12T18:32:20.728181Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:32:20.733296 waagent[1410]: 2024-04-12T18:32:20.733231Z INFO Daemon Daemon Using waagent for provisioning Apr 12 18:32:20.739066 waagent[1410]: 2024-04-12T18:32:20.739005Z INFO Daemon Daemon Activate resource disk Apr 12 18:32:20.743878 waagent[1410]: 2024-04-12T18:32:20.743813Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Apr 12 18:32:20.758186 waagent[1410]: 2024-04-12T18:32:20.758114Z INFO Daemon Daemon Found device: None Apr 12 18:32:20.762885 waagent[1410]: 2024-04-12T18:32:20.762810Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Apr 12 18:32:20.771226 waagent[1410]: 2024-04-12T18:32:20.771159Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Apr 12 18:32:20.783128 waagent[1410]: 2024-04-12T18:32:20.783064Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:32:20.788991 waagent[1410]: 2024-04-12T18:32:20.788921Z INFO Daemon Daemon Running default provisioning handler Apr 12 18:32:20.801795 waagent[1410]: 2024-04-12T18:32:20.801676Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:32:20.816361 waagent[1410]: 2024-04-12T18:32:20.816247Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:32:20.826174 waagent[1410]: 2024-04-12T18:32:20.826102Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:32:20.831436 waagent[1410]: 2024-04-12T18:32:20.831374Z INFO Daemon Daemon Copying ovf-env.xml Apr 12 18:32:20.952464 waagent[1410]: 2024-04-12T18:32:20.952325Z INFO Daemon Daemon Successfully mounted dvd Apr 12 18:32:21.094249 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Apr 12 18:32:21.149574 waagent[1410]: 2024-04-12T18:32:21.149406Z INFO Daemon Daemon Detect protocol endpoint Apr 12 18:32:21.154689 waagent[1410]: 2024-04-12T18:32:21.154609Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:32:21.160427 waagent[1410]: 2024-04-12T18:32:21.160358Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Apr 12 18:32:21.167032 waagent[1410]: 2024-04-12T18:32:21.166964Z INFO Daemon Daemon Test for route to 168.63.129.16 Apr 12 18:32:21.172634 waagent[1410]: 2024-04-12T18:32:21.172572Z INFO Daemon Daemon Route to 168.63.129.16 exists Apr 12 18:32:21.177702 waagent[1410]: 2024-04-12T18:32:21.177641Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Apr 12 18:32:21.291712 waagent[1410]: 2024-04-12T18:32:21.291598Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Apr 12 18:32:21.298927 waagent[1410]: 2024-04-12T18:32:21.298878Z INFO Daemon Daemon Wire protocol version:2012-11-30 Apr 12 18:32:21.304387 waagent[1410]: 2024-04-12T18:32:21.304327Z INFO Daemon Daemon Server preferred version:2015-04-05 Apr 12 18:32:22.167827 waagent[1410]: 2024-04-12T18:32:22.167683Z INFO Daemon Daemon Initializing goal state during protocol detection Apr 12 18:32:22.182379 waagent[1410]: 2024-04-12T18:32:22.182298Z INFO Daemon Daemon Forcing an update of the goal state.. Apr 12 18:32:22.188160 waagent[1410]: 2024-04-12T18:32:22.188090Z INFO Daemon Daemon Fetching goal state [incarnation 1] Apr 12 18:32:22.261429 waagent[1410]: 2024-04-12T18:32:22.261298Z INFO Daemon Daemon Found private key matching thumbprint FA76A6362B8B47818367667D2C8919F00EDC4F35 Apr 12 18:32:22.269752 waagent[1410]: 2024-04-12T18:32:22.269681Z INFO Daemon Daemon Certificate with thumbprint 0D5B8265A20BEBEA5A5BD02BD3616064026CB601 has no matching private key. Apr 12 18:32:22.279399 waagent[1410]: 2024-04-12T18:32:22.279325Z INFO Daemon Daemon Fetch goal state completed Apr 12 18:32:22.304369 waagent[1410]: 2024-04-12T18:32:22.304317Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 81b9c93a-98b6-4615-a005-ef2344072487 New eTag: 2554845610363071651] Apr 12 18:32:22.315114 waagent[1410]: 2024-04-12T18:32:22.315053Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:32:22.330666 waagent[1410]: 2024-04-12T18:32:22.330605Z INFO Daemon Daemon Starting provisioning Apr 12 18:32:22.335529 waagent[1410]: 2024-04-12T18:32:22.335468Z INFO Daemon Daemon Handle ovf-env.xml. Apr 12 18:32:22.340311 waagent[1410]: 2024-04-12T18:32:22.340256Z INFO Daemon Daemon Set hostname [ci-3510.3.3-a-55c15aa841] Apr 12 18:32:22.423922 waagent[1410]: 2024-04-12T18:32:22.423792Z INFO Daemon Daemon Publish hostname [ci-3510.3.3-a-55c15aa841] Apr 12 18:32:22.430450 waagent[1410]: 2024-04-12T18:32:22.430365Z INFO Daemon Daemon Examine /proc/net/route for primary interface Apr 12 18:32:22.437298 waagent[1410]: 2024-04-12T18:32:22.437222Z INFO Daemon Daemon Primary interface is [eth0] Apr 12 18:32:22.453197 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Apr 12 18:32:22.453363 systemd[1]: Stopped systemd-networkd-wait-online.service. Apr 12 18:32:22.453417 systemd[1]: Stopping systemd-networkd-wait-online.service... Apr 12 18:32:22.453660 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:32:22.458601 systemd-networkd[1178]: eth0: DHCPv6 lease lost Apr 12 18:32:22.460189 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:32:22.460356 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:32:22.462374 systemd[1]: Starting systemd-networkd.service... Apr 12 18:32:22.489160 systemd-networkd[1461]: enP64609s1: Link UP Apr 12 18:32:22.489415 systemd-networkd[1461]: enP64609s1: Gained carrier Apr 12 18:32:22.490519 systemd-networkd[1461]: eth0: Link UP Apr 12 18:32:22.490648 systemd-networkd[1461]: eth0: Gained carrier Apr 12 18:32:22.491022 systemd-networkd[1461]: lo: Link UP Apr 12 18:32:22.491085 systemd-networkd[1461]: lo: Gained carrier Apr 12 18:32:22.491363 systemd-networkd[1461]: eth0: Gained IPv6LL Apr 12 18:32:22.491883 systemd-networkd[1461]: Enumeration completed Apr 12 18:32:22.492213 systemd[1]: Started systemd-networkd.service. Apr 12 18:32:22.493841 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:32:22.499610 waagent[1410]: 2024-04-12T18:32:22.494826Z INFO Daemon Daemon Create user account if not exists Apr 12 18:32:22.500960 waagent[1410]: 2024-04-12T18:32:22.500883Z INFO Daemon Daemon User core already exists, skip useradd Apr 12 18:32:22.507086 systemd-networkd[1461]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:32:22.507229 waagent[1410]: 2024-04-12T18:32:22.507043Z INFO Daemon Daemon Configure sudoer Apr 12 18:32:22.512309 waagent[1410]: 2024-04-12T18:32:22.512239Z INFO Daemon Daemon Configure sshd Apr 12 18:32:22.516666 waagent[1410]: 2024-04-12T18:32:22.516600Z INFO Daemon Daemon Deploy ssh public key. Apr 12 18:32:22.532628 systemd-networkd[1461]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:32:22.534526 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:32:23.743806 waagent[1410]: 2024-04-12T18:32:23.743718Z INFO Daemon Daemon Provisioning complete Apr 12 18:32:23.763032 waagent[1410]: 2024-04-12T18:32:23.762968Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Apr 12 18:32:23.769078 waagent[1410]: 2024-04-12T18:32:23.769015Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Apr 12 18:32:23.779480 waagent[1410]: 2024-04-12T18:32:23.779416Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Apr 12 18:32:24.077600 waagent[1470]: 2024-04-12T18:32:24.077436Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Apr 12 18:32:24.078643 waagent[1470]: 2024-04-12T18:32:24.078587Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:24.078874 waagent[1470]: 2024-04-12T18:32:24.078826Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:24.090931 waagent[1470]: 2024-04-12T18:32:24.090859Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Apr 12 18:32:24.091231 waagent[1470]: 2024-04-12T18:32:24.091183Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Apr 12 18:32:24.156896 waagent[1470]: 2024-04-12T18:32:24.156760Z INFO ExtHandler ExtHandler Found private key matching thumbprint FA76A6362B8B47818367667D2C8919F00EDC4F35 Apr 12 18:32:24.157264 waagent[1470]: 2024-04-12T18:32:24.157214Z INFO ExtHandler ExtHandler Certificate with thumbprint 0D5B8265A20BEBEA5A5BD02BD3616064026CB601 has no matching private key. Apr 12 18:32:24.157577 waagent[1470]: 2024-04-12T18:32:24.157513Z INFO ExtHandler ExtHandler Fetch goal state completed Apr 12 18:32:24.172657 waagent[1470]: 2024-04-12T18:32:24.172601Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: d2029543-4d7b-484f-b24d-3ab1b707531f New eTag: 2554845610363071651] Apr 12 18:32:24.173380 waagent[1470]: 2024-04-12T18:32:24.173324Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:32:24.293052 waagent[1470]: 2024-04-12T18:32:24.292920Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:32:24.303244 waagent[1470]: 2024-04-12T18:32:24.303171Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1470 Apr 12 18:32:24.307042 waagent[1470]: 2024-04-12T18:32:24.306984Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:32:24.308449 waagent[1470]: 2024-04-12T18:32:24.308392Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:32:24.429447 waagent[1470]: 2024-04-12T18:32:24.429341Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:32:24.429998 waagent[1470]: 2024-04-12T18:32:24.429942Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:32:24.438039 waagent[1470]: 2024-04-12T18:32:24.437987Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:32:24.438717 waagent[1470]: 2024-04-12T18:32:24.438661Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:32:24.439994 waagent[1470]: 2024-04-12T18:32:24.439934Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Apr 12 18:32:24.441428 waagent[1470]: 2024-04-12T18:32:24.441362Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:32:24.441793 waagent[1470]: 2024-04-12T18:32:24.441722Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:24.442248 waagent[1470]: 2024-04-12T18:32:24.442181Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:24.442861 waagent[1470]: 2024-04-12T18:32:24.442798Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:32:24.443190 waagent[1470]: 2024-04-12T18:32:24.443131Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:32:24.443190 waagent[1470]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:32:24.443190 waagent[1470]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:32:24.443190 waagent[1470]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:32:24.443190 waagent[1470]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:24.443190 waagent[1470]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:24.443190 waagent[1470]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:24.445430 waagent[1470]: 2024-04-12T18:32:24.445272Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:32:24.446440 waagent[1470]: 2024-04-12T18:32:24.446370Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:24.446654 waagent[1470]: 2024-04-12T18:32:24.446597Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:24.447238 waagent[1470]: 2024-04-12T18:32:24.447173Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:32:24.447387 waagent[1470]: 2024-04-12T18:32:24.447341Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:32:24.447500 waagent[1470]: 2024-04-12T18:32:24.447458Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:32:24.448368 waagent[1470]: 2024-04-12T18:32:24.448311Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:32:24.448518 waagent[1470]: 2024-04-12T18:32:24.448449Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:32:24.449250 waagent[1470]: 2024-04-12T18:32:24.449158Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:32:24.449425 waagent[1470]: 2024-04-12T18:32:24.449360Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:32:24.449744 waagent[1470]: 2024-04-12T18:32:24.449676Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:32:24.459652 waagent[1470]: 2024-04-12T18:32:24.459579Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Apr 12 18:32:24.461126 waagent[1470]: 2024-04-12T18:32:24.461062Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:32:24.463844 waagent[1470]: 2024-04-12T18:32:24.463784Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Apr 12 18:32:24.491636 waagent[1470]: 2024-04-12T18:32:24.491495Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1461' Apr 12 18:32:24.504657 waagent[1470]: 2024-04-12T18:32:24.504595Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Apr 12 18:32:24.627735 waagent[1470]: 2024-04-12T18:32:24.627592Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:32:24.627735 waagent[1470]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:32:24.627735 waagent[1470]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:32:24.627735 waagent[1470]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:45:23 brd ff:ff:ff:ff:ff:ff Apr 12 18:32:24.627735 waagent[1470]: 3: enP64609s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:45:23 brd ff:ff:ff:ff:ff:ff\ altname enP64609p0s2 Apr 12 18:32:24.627735 waagent[1470]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:32:24.627735 waagent[1470]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:32:24.627735 waagent[1470]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:32:24.627735 waagent[1470]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:32:24.627735 waagent[1470]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:32:24.627735 waagent[1470]: 2: eth0 inet6 fe80::222:48ff:feb6:4523/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:32:24.665745 waagent[1470]: 2024-04-12T18:32:24.665676Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.8 -- exiting Apr 12 18:32:24.782839 waagent[1410]: 2024-04-12T18:32:24.782718Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Apr 12 18:32:24.786582 waagent[1410]: 2024-04-12T18:32:24.786515Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.8 to be the latest agent Apr 12 18:32:25.961874 waagent[1501]: 2024-04-12T18:32:25.961779Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.8) Apr 12 18:32:25.962562 waagent[1501]: 2024-04-12T18:32:25.962488Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.3 Apr 12 18:32:25.962696 waagent[1501]: 2024-04-12T18:32:25.962648Z INFO ExtHandler ExtHandler Python: 3.9.16 Apr 12 18:32:25.962818 waagent[1501]: 2024-04-12T18:32:25.962776Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Apr 12 18:32:25.970679 waagent[1501]: 2024-04-12T18:32:25.970542Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:32:25.971059 waagent[1501]: 2024-04-12T18:32:25.971003Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:25.971198 waagent[1501]: 2024-04-12T18:32:25.971152Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:25.983922 waagent[1501]: 2024-04-12T18:32:25.983849Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Apr 12 18:32:25.992637 waagent[1501]: 2024-04-12T18:32:25.992579Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.149 Apr 12 18:32:25.993678 waagent[1501]: 2024-04-12T18:32:25.993621Z INFO ExtHandler Apr 12 18:32:25.993827 waagent[1501]: 2024-04-12T18:32:25.993781Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 20942eed-c3f7-430f-9baa-efe7e7ecde21 eTag: 2554845610363071651 source: Fabric] Apr 12 18:32:25.994546 waagent[1501]: 2024-04-12T18:32:25.994485Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Apr 12 18:32:25.995769 waagent[1501]: 2024-04-12T18:32:25.995711Z INFO ExtHandler Apr 12 18:32:25.995902 waagent[1501]: 2024-04-12T18:32:25.995857Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Apr 12 18:32:26.002421 waagent[1501]: 2024-04-12T18:32:26.002371Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Apr 12 18:32:26.002924 waagent[1501]: 2024-04-12T18:32:26.002876Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:32:26.020414 waagent[1501]: 2024-04-12T18:32:26.020353Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Apr 12 18:32:26.089690 waagent[1501]: 2024-04-12T18:32:26.089526Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FA76A6362B8B47818367667D2C8919F00EDC4F35', 'hasPrivateKey': True} Apr 12 18:32:26.090799 waagent[1501]: 2024-04-12T18:32:26.090738Z INFO ExtHandler Downloaded certificate {'thumbprint': '0D5B8265A20BEBEA5A5BD02BD3616064026CB601', 'hasPrivateKey': False} Apr 12 18:32:26.091846 waagent[1501]: 2024-04-12T18:32:26.091789Z INFO ExtHandler Fetch goal state completed Apr 12 18:32:26.113151 waagent[1501]: 2024-04-12T18:32:26.113028Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Apr 12 18:32:26.125431 waagent[1501]: 2024-04-12T18:32:26.125329Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.8 running as process 1501 Apr 12 18:32:26.129000 waagent[1501]: 2024-04-12T18:32:26.128934Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:32:26.130448 waagent[1501]: 2024-04-12T18:32:26.130391Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:32:26.135158 waagent[1501]: 2024-04-12T18:32:26.135097Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:32:26.135545 waagent[1501]: 2024-04-12T18:32:26.135484Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:32:26.143233 waagent[1501]: 2024-04-12T18:32:26.143164Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:32:26.143776 waagent[1501]: 2024-04-12T18:32:26.143719Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:32:26.149538 waagent[1501]: 2024-04-12T18:32:26.149430Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Apr 12 18:32:26.150571 waagent[1501]: 2024-04-12T18:32:26.150485Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Apr 12 18:32:26.152147 waagent[1501]: 2024-04-12T18:32:26.152075Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:32:26.152836 waagent[1501]: 2024-04-12T18:32:26.152773Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:26.153096 waagent[1501]: 2024-04-12T18:32:26.153048Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:26.153805 waagent[1501]: 2024-04-12T18:32:26.153733Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:32:26.154455 waagent[1501]: 2024-04-12T18:32:26.154384Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:32:26.155034 waagent[1501]: 2024-04-12T18:32:26.154965Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:32:26.155034 waagent[1501]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:32:26.155034 waagent[1501]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:32:26.155034 waagent[1501]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:32:26.155034 waagent[1501]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:26.155034 waagent[1501]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:26.155034 waagent[1501]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:26.155203 waagent[1501]: 2024-04-12T18:32:26.155058Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:26.155291 waagent[1501]: 2024-04-12T18:32:26.155236Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:26.155796 waagent[1501]: 2024-04-12T18:32:26.155718Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:32:26.156005 waagent[1501]: 2024-04-12T18:32:26.155925Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:32:26.156200 waagent[1501]: 2024-04-12T18:32:26.156136Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:32:26.156490 waagent[1501]: 2024-04-12T18:32:26.156429Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:32:26.158747 waagent[1501]: 2024-04-12T18:32:26.158578Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:32:26.159253 waagent[1501]: 2024-04-12T18:32:26.159186Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:32:26.159754 waagent[1501]: 2024-04-12T18:32:26.159691Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:32:26.160724 waagent[1501]: 2024-04-12T18:32:26.160657Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:32:26.174061 waagent[1501]: 2024-04-12T18:32:26.173972Z INFO ExtHandler ExtHandler Downloading agent manifest Apr 12 18:32:26.180293 waagent[1501]: 2024-04-12T18:32:26.180219Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:32:26.180293 waagent[1501]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:32:26.180293 waagent[1501]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:32:26.180293 waagent[1501]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:45:23 brd ff:ff:ff:ff:ff:ff Apr 12 18:32:26.180293 waagent[1501]: 3: enP64609s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:45:23 brd ff:ff:ff:ff:ff:ff\ altname enP64609p0s2 Apr 12 18:32:26.180293 waagent[1501]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:32:26.180293 waagent[1501]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:32:26.180293 waagent[1501]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:32:26.180293 waagent[1501]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:32:26.180293 waagent[1501]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:32:26.180293 waagent[1501]: 2: eth0 inet6 fe80::222:48ff:feb6:4523/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:32:26.213196 waagent[1501]: 2024-04-12T18:32:26.213068Z INFO ExtHandler ExtHandler Apr 12 18:32:26.213328 waagent[1501]: 2024-04-12T18:32:26.213273Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: bb99403b-8e6b-45aa-b8be-07a21f6e8ad3 correlation 7f78828b-9f8d-4ae8-9812-fec36c99f81b created: 2024-04-12T18:30:33.599068Z] Apr 12 18:32:26.214450 waagent[1501]: 2024-04-12T18:32:26.214389Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Apr 12 18:32:26.216274 waagent[1501]: 2024-04-12T18:32:26.216218Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Apr 12 18:32:26.235886 waagent[1501]: 2024-04-12T18:32:26.235814Z INFO ExtHandler ExtHandler Looking for existing remote access users. Apr 12 18:32:26.274576 waagent[1501]: 2024-04-12T18:32:26.274478Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.8 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: AE45E19A-8F01-4DE9-8BB9-E384300E4D89;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Apr 12 18:32:26.457884 waagent[1501]: 2024-04-12T18:32:26.457757Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Apr 12 18:32:26.457884 waagent[1501]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.457884 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.457884 waagent[1501]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.457884 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.457884 waagent[1501]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.457884 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.457884 waagent[1501]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:32:26.457884 waagent[1501]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:32:26.457884 waagent[1501]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:32:26.465421 waagent[1501]: 2024-04-12T18:32:26.465278Z INFO EnvHandler ExtHandler Current Firewall rules: Apr 12 18:32:26.465421 waagent[1501]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.465421 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.465421 waagent[1501]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.465421 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.465421 waagent[1501]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:26.465421 waagent[1501]: pkts bytes target prot opt in out source destination Apr 12 18:32:26.465421 waagent[1501]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:32:26.465421 waagent[1501]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:32:26.465421 waagent[1501]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:32:26.466260 waagent[1501]: 2024-04-12T18:32:26.466211Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Apr 12 18:32:45.882584 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Apr 12 18:32:54.820543 update_engine[1303]: I0412 18:32:54.820502 1303 update_attempter.cc:509] Updating boot flags... Apr 12 18:33:11.187039 systemd[1]: Created slice system-sshd.slice. Apr 12 18:33:11.188208 systemd[1]: Started sshd@0-10.200.20.39:22-10.200.12.6:47792.service. Apr 12 18:33:11.894402 sshd[1617]: Accepted publickey for core from 10.200.12.6 port 47792 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:11.913237 sshd[1617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:11.917865 systemd[1]: Started session-3.scope. Apr 12 18:33:11.918569 systemd-logind[1299]: New session 3 of user core. Apr 12 18:33:12.288577 systemd[1]: Started sshd@1-10.200.20.39:22-10.200.12.6:47808.service. Apr 12 18:33:12.733502 sshd[1622]: Accepted publickey for core from 10.200.12.6 port 47808 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:12.735071 sshd[1622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:12.739122 systemd[1]: Started session-4.scope. Apr 12 18:33:12.740318 systemd-logind[1299]: New session 4 of user core. Apr 12 18:33:13.058113 sshd[1622]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:13.060750 systemd[1]: sshd@1-10.200.20.39:22-10.200.12.6:47808.service: Deactivated successfully. Apr 12 18:33:13.061410 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:33:13.061915 systemd-logind[1299]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:33:13.062779 systemd-logind[1299]: Removed session 4. Apr 12 18:33:13.126615 systemd[1]: Started sshd@2-10.200.20.39:22-10.200.12.6:47822.service. Apr 12 18:33:13.538920 sshd[1628]: Accepted publickey for core from 10.200.12.6 port 47822 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:13.540122 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:13.543601 systemd-logind[1299]: New session 5 of user core. Apr 12 18:33:13.544323 systemd[1]: Started session-5.scope. Apr 12 18:33:13.837206 sshd[1628]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:13.840006 systemd[1]: sshd@2-10.200.20.39:22-10.200.12.6:47822.service: Deactivated successfully. Apr 12 18:33:13.840669 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:33:13.841374 systemd-logind[1299]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:33:13.842145 systemd-logind[1299]: Removed session 5. Apr 12 18:33:13.906327 systemd[1]: Started sshd@3-10.200.20.39:22-10.200.12.6:47838.service. Apr 12 18:33:14.318607 sshd[1634]: Accepted publickey for core from 10.200.12.6 port 47838 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:14.320097 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:14.323544 systemd-logind[1299]: New session 6 of user core. Apr 12 18:33:14.323978 systemd[1]: Started session-6.scope. Apr 12 18:33:14.621816 sshd[1634]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:14.623807 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:33:14.624339 systemd-logind[1299]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:33:14.624445 systemd[1]: sshd@3-10.200.20.39:22-10.200.12.6:47838.service: Deactivated successfully. Apr 12 18:33:14.625354 systemd-logind[1299]: Removed session 6. Apr 12 18:33:14.690273 systemd[1]: Started sshd@4-10.200.20.39:22-10.200.12.6:47850.service. Apr 12 18:33:15.101701 sshd[1640]: Accepted publickey for core from 10.200.12.6 port 47850 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:15.102910 sshd[1640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:15.107032 systemd[1]: Started session-7.scope. Apr 12 18:33:15.107318 systemd-logind[1299]: New session 7 of user core. Apr 12 18:33:15.730626 sudo[1643]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:33:15.730823 sudo[1643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:15.788691 dbus-daemon[1285]: avc: received setenforce notice (enforcing=1) Apr 12 18:33:15.789570 sudo[1643]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:15.880178 sshd[1640]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:15.883378 systemd[1]: sshd@4-10.200.20.39:22-10.200.12.6:47850.service: Deactivated successfully. Apr 12 18:33:15.884140 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:33:15.884715 systemd-logind[1299]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:33:15.885781 systemd-logind[1299]: Removed session 7. Apr 12 18:33:15.949619 systemd[1]: Started sshd@5-10.200.20.39:22-10.200.12.6:33678.service. Apr 12 18:33:16.365140 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 33678 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:16.366455 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:16.370372 systemd-logind[1299]: New session 8 of user core. Apr 12 18:33:16.370804 systemd[1]: Started session-8.scope. Apr 12 18:33:16.603604 sudo[1651]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:33:16.604074 sudo[1651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:16.606661 sudo[1651]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:16.610529 sudo[1650]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:33:16.610761 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:16.618434 systemd[1]: Stopping audit-rules.service... Apr 12 18:33:16.618000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:33:16.623364 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:33:16.623480 kernel: audit: type=1305 audit(1712946796.618:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:33:16.634082 auditctl[1654]: No rules Apr 12 18:33:16.618000 audit[1654]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff95814c0 a2=420 a3=0 items=0 ppid=1 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.634669 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:33:16.634839 systemd[1]: Stopped audit-rules.service. Apr 12 18:33:16.636487 systemd[1]: Starting audit-rules.service... Apr 12 18:33:16.656430 kernel: audit: type=1300 audit(1712946796.618:177): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff95814c0 a2=420 a3=0 items=0 ppid=1 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.618000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:33:16.663615 kernel: audit: type=1327 audit(1712946796.618:177): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:33:16.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.679329 kernel: audit: type=1131 audit(1712946796.634:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.679546 augenrules[1671]: No rules Apr 12 18:33:16.680077 systemd[1]: Finished audit-rules.service. Apr 12 18:33:16.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.681075 sudo[1650]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:16.680000 audit[1650]: USER_END pid=1650 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.714301 kernel: audit: type=1130 audit(1712946796.679:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.714357 kernel: audit: type=1106 audit(1712946796.680:180): pid=1650 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.681000 audit[1650]: CRED_DISP pid=1650 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.730203 kernel: audit: type=1104 audit(1712946796.681:181): pid=1650 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.746877 sshd[1647]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:16.747000 audit[1647]: USER_END pid=1647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:16.770845 systemd[1]: sshd@5-10.200.20.39:22-10.200.12.6:33678.service: Deactivated successfully. Apr 12 18:33:16.747000 audit[1647]: CRED_DISP pid=1647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:16.789533 kernel: audit: type=1106 audit(1712946796.747:182): pid=1647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:16.789614 kernel: audit: type=1104 audit(1712946796.747:183): pid=1647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:16.771504 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:33:16.790119 systemd-logind[1299]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:33:16.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:33678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.808168 kernel: audit: type=1131 audit(1712946796.770:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:33678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:16.808330 systemd-logind[1299]: Removed session 8. Apr 12 18:33:16.819039 systemd[1]: Started sshd@6-10.200.20.39:22-10.200.12.6:33692.service. Apr 12 18:33:16.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:33692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:17.238000 audit[1677]: USER_ACCT pid=1677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:17.239041 sshd[1677]: Accepted publickey for core from 10.200.12.6 port 33692 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:17.239000 audit[1677]: CRED_ACQ pid=1677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:17.239000 audit[1677]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeae3d330 a2=3 a3=1 items=0 ppid=1 pid=1677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:17.240574 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:17.244464 systemd[1]: Started session-9.scope. Apr 12 18:33:17.245595 systemd-logind[1299]: New session 9 of user core. Apr 12 18:33:17.249000 audit[1677]: USER_START pid=1677 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:17.250000 audit[1679]: CRED_ACQ pid=1679 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:17.479000 audit[1680]: USER_ACCT pid=1680 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:17.479000 audit[1680]: CRED_REFR pid=1680 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:17.479716 sudo[1680]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:33:17.479902 sudo[1680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:17.481000 audit[1680]: USER_START pid=1680 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:18.172054 systemd[1]: Reloading. Apr 12 18:33:18.238622 /usr/lib/systemd/system-generators/torcx-generator[1712]: time="2024-04-12T18:33:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:33:18.238650 /usr/lib/systemd/system-generators/torcx-generator[1712]: time="2024-04-12T18:33:18Z" level=info msg="torcx already run" Apr 12 18:33:18.307292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:33:18.307566 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:33:18.322470 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:33:18.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.386000 audit: BPF prog-id=38 op=LOAD Apr 12 18:33:18.386000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.387000 audit: BPF prog-id=39 op=LOAD Apr 12 18:33:18.387000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:33:18.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.389000 audit: BPF prog-id=40 op=LOAD Apr 12 18:33:18.389000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.390000 audit: BPF prog-id=41 op=LOAD Apr 12 18:33:18.390000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:33:18.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit: BPF prog-id=42 op=LOAD Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.391000 audit: BPF prog-id=43 op=LOAD Apr 12 18:33:18.391000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:33:18.392000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.393000 audit: BPF prog-id=44 op=LOAD Apr 12 18:33:18.393000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit: BPF prog-id=45 op=LOAD Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.394000 audit: BPF prog-id=46 op=LOAD Apr 12 18:33:18.394000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:33:18.394000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:33:18.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.396000 audit: BPF prog-id=47 op=LOAD Apr 12 18:33:18.396000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit: BPF prog-id=48 op=LOAD Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.398000 audit: BPF prog-id=49 op=LOAD Apr 12 18:33:18.398000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:33:18.398000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.399000 audit: BPF prog-id=50 op=LOAD Apr 12 18:33:18.399000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit: BPF prog-id=51 op=LOAD Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:18.400000 audit: BPF prog-id=52 op=LOAD Apr 12 18:33:18.400000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:33:18.401000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:33:18.408159 systemd[1]: Started kubelet.service. Apr 12 18:33:18.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:18.433720 systemd[1]: Starting coreos-metadata.service... Apr 12 18:33:18.458176 kubelet[1768]: E0412 18:33:18.458132 1768 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:33:18.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:18.460060 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:33:18.460171 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:33:18.477722 coreos-metadata[1775]: Apr 12 18:33:18.477 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:33:18.480320 coreos-metadata[1775]: Apr 12 18:33:18.480 INFO Fetch successful Apr 12 18:33:18.480367 coreos-metadata[1775]: Apr 12 18:33:18.480 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Apr 12 18:33:18.482039 coreos-metadata[1775]: Apr 12 18:33:18.482 INFO Fetch successful Apr 12 18:33:18.482071 coreos-metadata[1775]: Apr 12 18:33:18.482 INFO Fetching http://168.63.129.16/machine/8ba64a5f-0d5d-477e-a405-5b39d2db2a3f/251828d6%2D56eb%2D4cc0%2D9bb9%2De37472039e11.%5Fci%2D3510.3.3%2Da%2D55c15aa841?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Apr 12 18:33:18.483624 coreos-metadata[1775]: Apr 12 18:33:18.483 INFO Fetch successful Apr 12 18:33:18.517385 coreos-metadata[1775]: Apr 12 18:33:18.517 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:33:18.529464 coreos-metadata[1775]: Apr 12 18:33:18.529 INFO Fetch successful Apr 12 18:33:18.537816 systemd[1]: Finished coreos-metadata.service. Apr 12 18:33:18.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.471790 systemd[1]: Stopped kubelet.service. Apr 12 18:33:22.476141 kernel: kauditd_printk_skb: 186 callbacks suppressed Apr 12 18:33:22.476232 kernel: audit: type=1130 audit(1712946802.470:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.507652 kernel: audit: type=1131 audit(1712946802.470:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.513076 systemd[1]: Reloading. Apr 12 18:33:22.584987 /usr/lib/systemd/system-generators/torcx-generator[1835]: time="2024-04-12T18:33:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:33:22.585016 /usr/lib/systemd/system-generators/torcx-generator[1835]: time="2024-04-12T18:33:22Z" level=info msg="torcx already run" Apr 12 18:33:22.656419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:33:22.656610 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:33:22.671785 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:33:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768821 kernel: audit: type=1400 audit(1712946802.737:371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768932 kernel: audit: type=1400 audit(1712946802.737:372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768962 kernel: audit: type=1400 audit(1712946802.738:373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.807521 kernel: audit: type=1400 audit(1712946802.738:374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.829388 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:33:22.829494 kernel: audit: type=1400 audit(1712946802.738:375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.829512 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.852536 kernel: audit: type=1400 audit(1712946802.738:376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit: BPF prog-id=53 op=LOAD Apr 12 18:33:22.752000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.767000 audit: BPF prog-id=54 op=LOAD Apr 12 18:33:22.767000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.783000 audit: BPF prog-id=55 op=LOAD Apr 12 18:33:22.783000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.805000 audit: BPF prog-id=56 op=LOAD Apr 12 18:33:22.806000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit: BPF prog-id=57 op=LOAD Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.806000 audit: BPF prog-id=58 op=LOAD Apr 12 18:33:22.806000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:33:22.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.852000 audit: BPF prog-id=62 op=LOAD Apr 12 18:33:22.852000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit: BPF prog-id=63 op=LOAD Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit: BPF prog-id=64 op=LOAD Apr 12 18:33:22.853000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:33:22.853000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit: BPF prog-id=65 op=LOAD Apr 12 18:33:22.854000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit: BPF prog-id=66 op=LOAD Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.854000 audit: BPF prog-id=67 op=LOAD Apr 12 18:33:22.854000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:33:22.854000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:33:22.869207 systemd[1]: Started kubelet.service. Apr 12 18:33:22.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.913134 kubelet[1892]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:22.913134 kubelet[1892]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:33:22.913134 kubelet[1892]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:22.913457 kubelet[1892]: I0412 18:33:22.913214 1892 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:33:23.840457 kubelet[1892]: I0412 18:33:23.840420 1892 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:33:23.840644 kubelet[1892]: I0412 18:33:23.840627 1892 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:33:23.841057 kubelet[1892]: I0412 18:33:23.841038 1892 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:33:23.844282 kubelet[1892]: I0412 18:33:23.844250 1892 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:33:23.848777 kubelet[1892]: W0412 18:33:23.848751 1892 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:33:23.849249 kubelet[1892]: I0412 18:33:23.849232 1892 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:33:23.849448 kubelet[1892]: I0412 18:33:23.849436 1892 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:33:23.849641 kubelet[1892]: I0412 18:33:23.849624 1892 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:33:23.849741 kubelet[1892]: I0412 18:33:23.849650 1892 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:33:23.849741 kubelet[1892]: I0412 18:33:23.849659 1892 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:33:23.849790 kubelet[1892]: I0412 18:33:23.849763 1892 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:23.849871 kubelet[1892]: I0412 18:33:23.849857 1892 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:33:23.849900 kubelet[1892]: I0412 18:33:23.849880 1892 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:33:23.849900 kubelet[1892]: I0412 18:33:23.849897 1892 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:33:23.849956 kubelet[1892]: I0412 18:33:23.849911 1892 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:33:23.850456 kubelet[1892]: E0412 18:33:23.850386 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:23.850852 kubelet[1892]: E0412 18:33:23.850465 1892 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:23.851042 kubelet[1892]: I0412 18:33:23.851028 1892 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:33:23.851355 kubelet[1892]: W0412 18:33:23.851342 1892 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:33:23.851872 kubelet[1892]: I0412 18:33:23.851856 1892 server.go:1232] "Started kubelet" Apr 12 18:33:23.852287 kubelet[1892]: I0412 18:33:23.852267 1892 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:33:23.852671 kubelet[1892]: I0412 18:33:23.852630 1892 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:33:23.852988 kubelet[1892]: I0412 18:33:23.852969 1892 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:33:23.853080 kubelet[1892]: I0412 18:33:23.853012 1892 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:33:23.852000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:23.852000 audit[1892]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000719fb0 a1=40007f69c0 a2=4000719f80 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:23.852000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:23.852000 audit[1892]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008ce9e0 a1=40007f69d8 a2=4000ac6060 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:23.854766 kubelet[1892]: I0412 18:33:23.854112 1892 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:33:23.854766 kubelet[1892]: I0412 18:33:23.854172 1892 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:33:23.854766 kubelet[1892]: I0412 18:33:23.854265 1892 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:33:23.856247 kubelet[1892]: E0412 18:33:23.856231 1892 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:33:23.856347 kubelet[1892]: E0412 18:33:23.856337 1892 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:33:23.856000 audit[1904]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.856000 audit[1904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd88fc7e0 a2=0 a3=1 items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:33:23.857000 audit[1905]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.857000 audit[1905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe76f4370 a2=0 a3=1 items=0 ppid=1892 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:33:23.860065 kubelet[1892]: I0412 18:33:23.860025 1892 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:33:23.859000 audit[1907]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.859000 audit[1907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeceacb50 a2=0 a3=1 items=0 ppid=1892 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:23.862163 kubelet[1892]: I0412 18:33:23.862133 1892 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:33:23.862213 kubelet[1892]: I0412 18:33:23.862205 1892 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:33:23.861000 audit[1909]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.861000 audit[1909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcdb15bb0 a2=0 a3=1 items=0 ppid=1892 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:23.876955 kubelet[1892]: W0412 18:33:23.876926 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.39" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:33:23.877133 kubelet[1892]: E0412 18:33:23.877122 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.39" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:33:23.877231 kubelet[1892]: E0412 18:33:23.877218 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:33:23.877312 kubelet[1892]: W0412 18:33:23.877300 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:33:23.877384 kubelet[1892]: E0412 18:33:23.877365 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:33:23.877581 kubelet[1892]: E0412 18:33:23.877481 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae2babf38", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 851837240, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 851837240, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.877921 kubelet[1892]: W0412 18:33:23.877903 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:33:23.878000 kubelet[1892]: E0412 18:33:23.877990 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:33:23.880198 kubelet[1892]: E0412 18:33:23.880123 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae2ff41df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 856327135, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 856327135, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.884303 kubelet[1892]: I0412 18:33:23.884286 1892 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:33:23.884432 kubelet[1892]: I0412 18:33:23.884421 1892 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:33:23.884495 kubelet[1892]: I0412 18:33:23.884487 1892 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:23.885016 kubelet[1892]: E0412 18:33:23.884949 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49dd3fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883496446, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883496446, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.885811 kubelet[1892]: E0412 18:33:23.885757 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49de696", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883501206, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883501206, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.886714 kubelet[1892]: E0412 18:33:23.886645 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49df10d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883503885, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883503885, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.890077 kubelet[1892]: I0412 18:33:23.890058 1892 policy_none.go:49] "None policy: Start" Apr 12 18:33:23.890870 kubelet[1892]: I0412 18:33:23.890854 1892 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:33:23.890974 kubelet[1892]: I0412 18:33:23.890964 1892 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:33:23.901482 systemd[1]: Created slice kubepods.slice. Apr 12 18:33:23.906493 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:33:23.910022 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:33:23.917445 kubelet[1892]: I0412 18:33:23.917413 1892 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:33:23.915000 audit[1892]: AVC avc: denied { mac_admin } for pid=1892 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.915000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:23.915000 audit[1892]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e32d20 a1=4000efb710 a2=4000e32cf0 a3=25 items=0 ppid=1 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.915000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:23.917894 kubelet[1892]: I0412 18:33:23.917491 1892 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:33:23.917894 kubelet[1892]: I0412 18:33:23.917706 1892 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:33:23.919403 kubelet[1892]: E0412 18:33:23.919068 1892 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.39\" not found" Apr 12 18:33:23.920419 kubelet[1892]: E0412 18:33:23.920310 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae6c0b79a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 919337370, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 919337370, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.926000 audit[1915]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.926000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffead8f500 a2=0 a3=1 items=0 ppid=1892 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:33:23.928260 kubelet[1892]: I0412 18:33:23.928232 1892 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:33:23.927000 audit[1916]: NETFILTER_CFG table=mangle:10 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.927000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6bc28c0 a2=0 a3=1 items=0 ppid=1892 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:33:23.928000 audit[1917]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:23.928000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc6296590 a2=0 a3=1 items=0 ppid=1892 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:33:23.930320 kubelet[1892]: I0412 18:33:23.930295 1892 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:33:23.930394 kubelet[1892]: I0412 18:33:23.930330 1892 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:33:23.930394 kubelet[1892]: I0412 18:33:23.930349 1892 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:33:23.930443 kubelet[1892]: E0412 18:33:23.930400 1892 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:33:23.929000 audit[1918]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.929000 audit[1918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffec2823b0 a2=0 a3=1 items=0 ppid=1892 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:33:23.931869 kubelet[1892]: W0412 18:33:23.931851 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:33:23.931968 kubelet[1892]: E0412 18:33:23.931957 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:33:23.930000 audit[1919]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:23.930000 audit[1919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9be8bf0 a2=0 a3=1 items=0 ppid=1892 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:33:23.931000 audit[1920]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:23.931000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed087550 a2=0 a3=1 items=0 ppid=1892 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:33:23.932000 audit[1921]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:23.932000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcb496c50 a2=0 a3=1 items=0 ppid=1892 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.932000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:33:23.933000 audit[1922]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:23.933000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8543620 a2=0 a3=1 items=0 ppid=1892 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:33:23.961477 kubelet[1892]: I0412 18:33:23.961445 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.39" Apr 12 18:33:23.962460 kubelet[1892]: E0412 18:33:23.962438 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.39" Apr 12 18:33:23.962879 kubelet[1892]: E0412 18:33:23.962803 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49dd3fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883496446, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 961389617, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49dd3fe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.963783 kubelet[1892]: E0412 18:33:23.963727 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49de696", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883501206, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 961405856, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49de696" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:23.964658 kubelet[1892]: E0412 18:33:23.964604 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49df10d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883503885, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 961409415, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49df10d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.079141 kubelet[1892]: E0412 18:33:24.079116 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:33:24.164141 kubelet[1892]: I0412 18:33:24.164054 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.39" Apr 12 18:33:24.167698 kubelet[1892]: E0412 18:33:24.167671 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.39" Apr 12 18:33:24.168192 kubelet[1892]: E0412 18:33:24.168118 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49dd3fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883496446, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 164011591, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49dd3fe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.169147 kubelet[1892]: E0412 18:33:24.169091 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49de696", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883501206, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 164023710, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49de696" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.170003 kubelet[1892]: E0412 18:33:24.169953 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49df10d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883503885, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 164027070, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49df10d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.481137 kubelet[1892]: E0412 18:33:24.481111 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.39\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:33:24.569287 kubelet[1892]: I0412 18:33:24.569268 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.39" Apr 12 18:33:24.570725 kubelet[1892]: E0412 18:33:24.570700 1892 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.39" Apr 12 18:33:24.570918 kubelet[1892]: E0412 18:33:24.570842 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49dd3fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.39 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883496446, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 569223432, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49dd3fe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.571941 kubelet[1892]: E0412 18:33:24.571879 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49de696", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.39 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883501206, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 569235431, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49de696" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.572882 kubelet[1892]: E0412 18:33:24.572832 1892 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39.17c59c0ae49df10d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.39", UID:"10.200.20.39", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.39 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 23, 883503885, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 24, 569241270, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'events "10.200.20.39.17c59c0ae49df10d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:33:24.795844 kubelet[1892]: W0412 18:33:24.795757 1892 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:33:24.795971 kubelet[1892]: E0412 18:33:24.795959 1892 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:33:24.844128 kubelet[1892]: I0412 18:33:24.844106 1892 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:33:24.851504 kubelet[1892]: E0412 18:33:24.851475 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:25.226948 kubelet[1892]: E0412 18:33:25.226905 1892 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.39" not found Apr 12 18:33:25.285116 kubelet[1892]: E0412 18:33:25.285080 1892 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.39\" not found" node="10.200.20.39" Apr 12 18:33:25.372030 kubelet[1892]: I0412 18:33:25.371997 1892 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.39" Apr 12 18:33:25.376412 kubelet[1892]: I0412 18:33:25.376378 1892 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.39" Apr 12 18:33:25.402852 kubelet[1892]: I0412 18:33:25.402826 1892 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:33:25.403476 env[1311]: time="2024-04-12T18:33:25.403387060Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:33:25.403955 kubelet[1892]: I0412 18:33:25.403938 1892 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:33:25.412000 audit[1680]: USER_END pid=1680 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:25.412000 audit[1680]: CRED_DISP pid=1680 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:25.413022 sudo[1680]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:25.486794 sshd[1677]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:25.487000 audit[1677]: USER_END pid=1677 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:25.487000 audit[1677]: CRED_DISP pid=1677 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:25.489975 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:33:25.490900 systemd[1]: sshd@6-10.200.20.39:22-10.200.12.6:33692.service: Deactivated successfully. Apr 12 18:33:25.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:33692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:25.492176 systemd-logind[1299]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:33:25.493315 systemd-logind[1299]: Removed session 9. Apr 12 18:33:25.851673 kubelet[1892]: I0412 18:33:25.851171 1892 apiserver.go:52] "Watching apiserver" Apr 12 18:33:25.851894 kubelet[1892]: E0412 18:33:25.851877 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:25.853950 kubelet[1892]: I0412 18:33:25.853926 1892 topology_manager.go:215] "Topology Admit Handler" podUID="8d291a4c-913e-49a0-a305-612ae3a9a517" podNamespace="calico-system" podName="calico-node-qqj2g" Apr 12 18:33:25.854050 kubelet[1892]: I0412 18:33:25.854033 1892 topology_manager.go:215] "Topology Admit Handler" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" podNamespace="calico-system" podName="csi-node-driver-5llkk" Apr 12 18:33:25.854085 kubelet[1892]: I0412 18:33:25.854080 1892 topology_manager.go:215] "Topology Admit Handler" podUID="2a939b98-6dd7-4fbf-9ddd-fbead1d0940f" podNamespace="kube-system" podName="kube-proxy-kbn2f" Apr 12 18:33:25.854916 kubelet[1892]: E0412 18:33:25.854887 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:25.860353 systemd[1]: Created slice kubepods-besteffort-pod2a939b98_6dd7_4fbf_9ddd_fbead1d0940f.slice. Apr 12 18:33:25.862454 systemd[1]: Created slice kubepods-besteffort-pod8d291a4c_913e_49a0_a305_612ae3a9a517.slice. Apr 12 18:33:25.863072 kubelet[1892]: I0412 18:33:25.863048 1892 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:33:25.873925 kubelet[1892]: I0412 18:33:25.873889 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2a939b98-6dd7-4fbf-9ddd-fbead1d0940f-xtables-lock\") pod \"kube-proxy-kbn2f\" (UID: \"2a939b98-6dd7-4fbf-9ddd-fbead1d0940f\") " pod="kube-system/kube-proxy-kbn2f" Apr 12 18:33:25.873925 kubelet[1892]: I0412 18:33:25.873928 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2a939b98-6dd7-4fbf-9ddd-fbead1d0940f-lib-modules\") pod \"kube-proxy-kbn2f\" (UID: \"2a939b98-6dd7-4fbf-9ddd-fbead1d0940f\") " pod="kube-system/kube-proxy-kbn2f" Apr 12 18:33:25.874089 kubelet[1892]: I0412 18:33:25.873953 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-lib-modules\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874089 kubelet[1892]: I0412 18:33:25.873972 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-xtables-lock\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874089 kubelet[1892]: I0412 18:33:25.873997 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8d291a4c-913e-49a0-a305-612ae3a9a517-node-certs\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874089 kubelet[1892]: I0412 18:33:25.874015 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-cni-net-dir\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874089 kubelet[1892]: I0412 18:33:25.874032 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-policysync\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874197 kubelet[1892]: I0412 18:33:25.874049 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8d291a4c-913e-49a0-a305-612ae3a9a517-tigera-ca-bundle\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874197 kubelet[1892]: I0412 18:33:25.874076 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-var-run-calico\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874197 kubelet[1892]: I0412 18:33:25.874096 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e0f49eee-6bc5-4b84-8eaf-447c55705651-kubelet-dir\") pod \"csi-node-driver-5llkk\" (UID: \"e0f49eee-6bc5-4b84-8eaf-447c55705651\") " pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:25.874197 kubelet[1892]: I0412 18:33:25.874113 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e0f49eee-6bc5-4b84-8eaf-447c55705651-socket-dir\") pod \"csi-node-driver-5llkk\" (UID: \"e0f49eee-6bc5-4b84-8eaf-447c55705651\") " pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:25.874197 kubelet[1892]: I0412 18:33:25.874132 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e0f49eee-6bc5-4b84-8eaf-447c55705651-registration-dir\") pod \"csi-node-driver-5llkk\" (UID: \"e0f49eee-6bc5-4b84-8eaf-447c55705651\") " pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:25.874304 kubelet[1892]: I0412 18:33:25.874149 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2a939b98-6dd7-4fbf-9ddd-fbead1d0940f-kube-proxy\") pod \"kube-proxy-kbn2f\" (UID: \"2a939b98-6dd7-4fbf-9ddd-fbead1d0940f\") " pod="kube-system/kube-proxy-kbn2f" Apr 12 18:33:25.874304 kubelet[1892]: I0412 18:33:25.874168 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-26x66\" (UniqueName: \"kubernetes.io/projected/2a939b98-6dd7-4fbf-9ddd-fbead1d0940f-kube-api-access-26x66\") pod \"kube-proxy-kbn2f\" (UID: \"2a939b98-6dd7-4fbf-9ddd-fbead1d0940f\") " pod="kube-system/kube-proxy-kbn2f" Apr 12 18:33:25.874304 kubelet[1892]: I0412 18:33:25.874185 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-var-lib-calico\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874304 kubelet[1892]: I0412 18:33:25.874203 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-cni-bin-dir\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874304 kubelet[1892]: I0412 18:33:25.874222 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-cni-log-dir\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874451 kubelet[1892]: I0412 18:33:25.874242 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r72mq\" (UniqueName: \"kubernetes.io/projected/e0f49eee-6bc5-4b84-8eaf-447c55705651-kube-api-access-r72mq\") pod \"csi-node-driver-5llkk\" (UID: \"e0f49eee-6bc5-4b84-8eaf-447c55705651\") " pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:25.874451 kubelet[1892]: I0412 18:33:25.874259 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8d291a4c-913e-49a0-a305-612ae3a9a517-flexvol-driver-host\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874451 kubelet[1892]: I0412 18:33:25.874277 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7ffkr\" (UniqueName: \"kubernetes.io/projected/8d291a4c-913e-49a0-a305-612ae3a9a517-kube-api-access-7ffkr\") pod \"calico-node-qqj2g\" (UID: \"8d291a4c-913e-49a0-a305-612ae3a9a517\") " pod="calico-system/calico-node-qqj2g" Apr 12 18:33:25.874451 kubelet[1892]: I0412 18:33:25.874294 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e0f49eee-6bc5-4b84-8eaf-447c55705651-varrun\") pod \"csi-node-driver-5llkk\" (UID: \"e0f49eee-6bc5-4b84-8eaf-447c55705651\") " pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:25.982432 kubelet[1892]: E0412 18:33:25.982408 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:25.982608 kubelet[1892]: W0412 18:33:25.982590 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:25.982686 kubelet[1892]: E0412 18:33:25.982675 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:26.008699 kubelet[1892]: E0412 18:33:26.008674 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:26.008848 kubelet[1892]: W0412 18:33:26.008832 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:26.008937 kubelet[1892]: E0412 18:33:26.008927 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:26.013397 kubelet[1892]: E0412 18:33:26.012508 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:26.013397 kubelet[1892]: W0412 18:33:26.012528 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:26.013397 kubelet[1892]: E0412 18:33:26.012547 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:26.033050 kubelet[1892]: E0412 18:33:26.033022 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:26.033050 kubelet[1892]: W0412 18:33:26.033042 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:26.033199 kubelet[1892]: E0412 18:33:26.033068 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:26.172651 env[1311]: time="2024-04-12T18:33:26.172460583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qqj2g,Uid:8d291a4c-913e-49a0-a305-612ae3a9a517,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:26.174437 env[1311]: time="2024-04-12T18:33:26.174194100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kbn2f,Uid:2a939b98-6dd7-4fbf-9ddd-fbead1d0940f,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:26.852482 kubelet[1892]: E0412 18:33:26.852444 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:27.313986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2039122251.mount: Deactivated successfully. Apr 12 18:33:27.340720 env[1311]: time="2024-04-12T18:33:27.340666835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.344410 env[1311]: time="2024-04-12T18:33:27.344340261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.356481 env[1311]: time="2024-04-12T18:33:27.356441501Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.358471 env[1311]: time="2024-04-12T18:33:27.358434403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.360136 env[1311]: time="2024-04-12T18:33:27.360110846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.363043 env[1311]: time="2024-04-12T18:33:27.363007245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.365189 env[1311]: time="2024-04-12T18:33:27.365161656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.368765 env[1311]: time="2024-04-12T18:33:27.368735168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.439191 env[1311]: time="2024-04-12T18:33:27.436734690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:27.439191 env[1311]: time="2024-04-12T18:33:27.436771448Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:27.439191 env[1311]: time="2024-04-12T18:33:27.436782367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:27.439191 env[1311]: time="2024-04-12T18:33:27.436886520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37faab91980d1d34b61afdca8bdf90a73d2dc7740468dc26c5d653530cc86f29 pid=1939 runtime=io.containerd.runc.v2 Apr 12 18:33:27.442100 env[1311]: time="2024-04-12T18:33:27.441588473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:27.442100 env[1311]: time="2024-04-12T18:33:27.441626991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:27.442100 env[1311]: time="2024-04-12T18:33:27.441636710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:27.442100 env[1311]: time="2024-04-12T18:33:27.441775220Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f pid=1957 runtime=io.containerd.runc.v2 Apr 12 18:33:27.458150 systemd[1]: Started cri-containerd-37faab91980d1d34b61afdca8bdf90a73d2dc7740468dc26c5d653530cc86f29.scope. Apr 12 18:33:27.465217 systemd[1]: Started cri-containerd-4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f.scope. Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483877 kernel: kauditd_printk_skb: 276 callbacks suppressed Apr 12 18:33:27.483992 kernel: audit: type=1400 audit(1712946807.477:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.523570 kernel: audit: type=1400 audit(1712946807.477:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.523673 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:33:27.523713 kernel: audit: type=1400 audit(1712946807.477:537): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.547893 kernel: audit: audit_lost=30 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:33:27.548101 kernel: audit: type=1400 audit(1712946807.477:538): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.569373 kernel: audit: backlog limit exceeded Apr 12 18:33:27.569506 kernel: audit: type=1400 audit(1712946807.477:539): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.591652 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:33:27.591740 kernel: audit: type=1400 audit(1712946807.477:540): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit: BPF prog-id=68 op=LOAD Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019fb38 a2=10 a3=0 items=0 ppid=1939 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666161623931393830643164333462363161666463613862646639 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019f5a0 a2=3c a3=0 items=0 ppid=1939 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666161623931393830643164333462363161666463613862646639 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.478000 audit: BPF prog-id=69 op=LOAD Apr 12 18:33:27.478000 audit[1969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019f8e0 a2=78 a3=0 items=0 ppid=1939 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666161623931393830643164333462363161666463613862646639 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.483000 audit: BPF prog-id=70 op=LOAD Apr 12 18:33:27.483000 audit[1969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019f670 a2=78 a3=0 items=0 ppid=1939 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666161623931393830643164333462363161666463613862646639 Apr 12 18:33:27.500000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:33:27.500000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.500000 audit: BPF prog-id=71 op=LOAD Apr 12 18:33:27.500000 audit[1969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019fb40 a2=78 a3=0 items=0 ppid=1939 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337666161623931393830643164333462363161666463613862646639 Apr 12 18:33:27.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.591000 audit: BPF prog-id=72 op=LOAD Apr 12 18:33:27.624262 env[1311]: time="2024-04-12T18:33:27.623517691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kbn2f,Uid:2a939b98-6dd7-4fbf-9ddd-fbead1d0940f,Namespace:kube-system,Attempt:0,} returns sandbox id \"37faab91980d1d34b61afdca8bdf90a73d2dc7740468dc26c5d653530cc86f29\"" Apr 12 18:33:27.624262 env[1311]: time="2024-04-12T18:33:27.623875546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qqj2g,Uid:8d291a4c-913e-49a0-a305-612ae3a9a517,Namespace:calico-system,Attempt:0,} returns sandbox id \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\"" Apr 12 18:33:27.625525 env[1311]: time="2024-04-12T18:33:27.625500393Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:33:27.853490 kubelet[1892]: E0412 18:33:27.853393 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:27.932880 kubelet[1892]: E0412 18:33:27.931619 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:28.801411 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240658806.mount: Deactivated successfully. Apr 12 18:33:28.854224 kubelet[1892]: E0412 18:33:28.854166 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:29.243853 env[1311]: time="2024-04-12T18:33:29.243811504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.249262 env[1311]: time="2024-04-12T18:33:29.249222547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.252071 env[1311]: time="2024-04-12T18:33:29.252040721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.258745 env[1311]: time="2024-04-12T18:33:29.258695362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.259031 env[1311]: time="2024-04-12T18:33:29.258998262Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 18:33:29.260245 env[1311]: time="2024-04-12T18:33:29.260201542Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:33:29.261689 env[1311]: time="2024-04-12T18:33:29.261660526Z" level=info msg="CreateContainer within sandbox \"37faab91980d1d34b61afdca8bdf90a73d2dc7740468dc26c5d653530cc86f29\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:33:29.298344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2469011148.mount: Deactivated successfully. Apr 12 18:33:29.319401 env[1311]: time="2024-04-12T18:33:29.319342761Z" level=info msg="CreateContainer within sandbox \"37faab91980d1d34b61afdca8bdf90a73d2dc7740468dc26c5d653530cc86f29\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3d7329382bd703a367dc5808a6adea691c1415c530b9a3965ab9e1ed50da5051\"" Apr 12 18:33:29.320338 env[1311]: time="2024-04-12T18:33:29.320307097Z" level=info msg="StartContainer for \"3d7329382bd703a367dc5808a6adea691c1415c530b9a3965ab9e1ed50da5051\"" Apr 12 18:33:29.341713 systemd[1]: run-containerd-runc-k8s.io-3d7329382bd703a367dc5808a6adea691c1415c530b9a3965ab9e1ed50da5051-runc.fgTxcO.mount: Deactivated successfully. Apr 12 18:33:29.342950 systemd[1]: Started cri-containerd-3d7329382bd703a367dc5808a6adea691c1415c530b9a3965ab9e1ed50da5051.scope. Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1939 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373332393338326264373033613336376463353830386136616465 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.356000 audit: BPF prog-id=76 op=LOAD Apr 12 18:33:29.356000 audit[2026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1939 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373332393338326264373033613336376463353830386136616465 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit: BPF prog-id=77 op=LOAD Apr 12 18:33:29.357000 audit[2026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1939 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373332393338326264373033613336376463353830386136616465 Apr 12 18:33:29.357000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:33:29.357000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:29.357000 audit: BPF prog-id=78 op=LOAD Apr 12 18:33:29.357000 audit[2026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1939 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373332393338326264373033613336376463353830386136616465 Apr 12 18:33:29.375854 env[1311]: time="2024-04-12T18:33:29.375806596Z" level=info msg="StartContainer for \"3d7329382bd703a367dc5808a6adea691c1415c530b9a3965ab9e1ed50da5051\" returns successfully" Apr 12 18:33:29.427000 audit[2075]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.427000 audit[2075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff9c2c10 a2=0 a3=1 items=0 ppid=2035 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:33:29.428000 audit[2076]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.428000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff265e770 a2=0 a3=1 items=0 ppid=2035 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:33:29.429000 audit[2078]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.429000 audit[2078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebc37e90 a2=0 a3=1 items=0 ppid=2035 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:33:29.429000 audit[2079]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.429000 audit[2079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe83a21d0 a2=0 a3=1 items=0 ppid=2035 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:33:29.431000 audit[2080]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.431000 audit[2080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4628a50 a2=0 a3=1 items=0 ppid=2035 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:33:29.432000 audit[2081]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.432000 audit[2081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff18bcad0 a2=0 a3=1 items=0 ppid=2035 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:33:29.528000 audit[2082]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.528000 audit[2082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff59a8610 a2=0 a3=1 items=0 ppid=2035 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:33:29.532000 audit[2084]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.532000 audit[2084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe2d34c80 a2=0 a3=1 items=0 ppid=2035 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:33:29.536000 audit[2087]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.536000 audit[2087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffbd34d60 a2=0 a3=1 items=0 ppid=2035 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:33:29.537000 audit[2088]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.537000 audit[2088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6743e30 a2=0 a3=1 items=0 ppid=2035 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:33:29.540000 audit[2090]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.540000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdccaa110 a2=0 a3=1 items=0 ppid=2035 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:33:29.541000 audit[2091]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.541000 audit[2091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc22f51c0 a2=0 a3=1 items=0 ppid=2035 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:33:29.543000 audit[2093]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.543000 audit[2093]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc9e45340 a2=0 a3=1 items=0 ppid=2035 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:33:29.546000 audit[2096]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.546000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4b63080 a2=0 a3=1 items=0 ppid=2035 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:33:29.547000 audit[2097]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.547000 audit[2097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedc351c0 a2=0 a3=1 items=0 ppid=2035 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:33:29.549000 audit[2099]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.549000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd545b030 a2=0 a3=1 items=0 ppid=2035 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:33:29.549000 audit[2100]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.549000 audit[2100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcdb71780 a2=0 a3=1 items=0 ppid=2035 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:33:29.551000 audit[2102]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.551000 audit[2102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc0f3b00 a2=0 a3=1 items=0 ppid=2035 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:29.554000 audit[2105]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.554000 audit[2105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe06b850 a2=0 a3=1 items=0 ppid=2035 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:29.557000 audit[2108]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.557000 audit[2108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdea69ea0 a2=0 a3=1 items=0 ppid=2035 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:33:29.558000 audit[2109]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.558000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc36c400 a2=0 a3=1 items=0 ppid=2035 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:33:29.561000 audit[2111]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.561000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffde524730 a2=0 a3=1 items=0 ppid=2035 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:29.656000 audit[2116]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.656000 audit[2116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe2622ea0 a2=0 a3=1 items=0 ppid=2035 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:29.657000 audit[2117]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.657000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef258380 a2=0 a3=1 items=0 ppid=2035 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:33:29.659000 audit[2119]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:29.659000 audit[2119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffe4905b0 a2=0 a3=1 items=0 ppid=2035 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:33:29.703000 audit[2125]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:29.703000 audit[2125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdc8b0380 a2=0 a3=1 items=0 ppid=2035 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.703000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:29.761000 audit[2125]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:29.761000 audit[2125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffdc8b0380 a2=0 a3=1 items=0 ppid=2035 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:29.806000 audit[2133]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.806000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffecc19680 a2=0 a3=1 items=0 ppid=2035 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:33:29.808000 audit[2135]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.808000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbc16d40 a2=0 a3=1 items=0 ppid=2035 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:33:29.812000 audit[2138]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.812000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc130cb50 a2=0 a3=1 items=0 ppid=2035 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:33:29.813000 audit[2139]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.813000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc64c8ae0 a2=0 a3=1 items=0 ppid=2035 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:33:29.815000 audit[2141]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.815000 audit[2141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc8cf3170 a2=0 a3=1 items=0 ppid=2035 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:33:29.816000 audit[2142]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.816000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda9a73b0 a2=0 a3=1 items=0 ppid=2035 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:33:29.818000 audit[2144]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.818000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffca94eb0 a2=0 a3=1 items=0 ppid=2035 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:33:29.822000 audit[2147]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.822000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8ac7e30 a2=0 a3=1 items=0 ppid=2035 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:33:29.823000 audit[2148]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.823000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6e0e3d0 a2=0 a3=1 items=0 ppid=2035 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:33:29.825000 audit[2150]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.825000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe744b440 a2=0 a3=1 items=0 ppid=2035 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:33:29.825000 audit[2151]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.825000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc08640f0 a2=0 a3=1 items=0 ppid=2035 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:33:29.827000 audit[2153]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.827000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5147330 a2=0 a3=1 items=0 ppid=2035 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:29.830000 audit[2156]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.830000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdfac7290 a2=0 a3=1 items=0 ppid=2035 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:33:29.833000 audit[2159]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.833000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff3c4d20 a2=0 a3=1 items=0 ppid=2035 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:33:29.834000 audit[2160]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.834000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc071fc90 a2=0 a3=1 items=0 ppid=2035 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:33:29.836000 audit[2162]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.836000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd47023b0 a2=0 a3=1 items=0 ppid=2035 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:29.839000 audit[2165]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.839000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd1acde70 a2=0 a3=1 items=0 ppid=2035 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:29.840000 audit[2166]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.840000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec687ee0 a2=0 a3=1 items=0 ppid=2035 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:33:29.842000 audit[2168]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.842000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd423b6a0 a2=0 a3=1 items=0 ppid=2035 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:33:29.843000 audit[2169]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.843000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc532b870 a2=0 a3=1 items=0 ppid=2035 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:33:29.845000 audit[2171]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.845000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffb3e70a0 a2=0 a3=1 items=0 ppid=2035 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:29.848000 audit[2174]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:29.848000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc7908370 a2=0 a3=1 items=0 ppid=2035 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:29.850000 audit[2176]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:33:29.850000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff4c57230 a2=0 a3=1 items=0 ppid=2035 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.850000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:29.850000 audit[2176]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:33:29.850000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff4c57230 a2=0 a3=1 items=0 ppid=2035 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:29.850000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:29.854996 kubelet[1892]: E0412 18:33:29.854969 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:29.931062 kubelet[1892]: E0412 18:33:29.930673 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:29.953424 kubelet[1892]: I0412 18:33:29.953295 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kbn2f" podStartSLOduration=3.318593873 podCreationTimestamp="2024-04-12 18:33:25 +0000 UTC" firstStartedPulling="2024-04-12 18:33:27.624768444 +0000 UTC m=+4.752291240" lastFinishedPulling="2024-04-12 18:33:29.259415634 +0000 UTC m=+6.386938510" observedRunningTime="2024-04-12 18:33:29.95313003 +0000 UTC m=+7.080652826" watchObservedRunningTime="2024-04-12 18:33:29.953241143 +0000 UTC m=+7.080763939" Apr 12 18:33:29.997560 kubelet[1892]: E0412 18:33:29.997517 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.997560 kubelet[1892]: W0412 18:33:29.997545 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.997651 kubelet[1892]: E0412 18:33:29.997585 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.997775 kubelet[1892]: E0412 18:33:29.997756 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.997804 kubelet[1892]: W0412 18:33:29.997776 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.997804 kubelet[1892]: E0412 18:33:29.997796 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.997963 kubelet[1892]: E0412 18:33:29.997945 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.997963 kubelet[1892]: W0412 18:33:29.997957 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998022 kubelet[1892]: E0412 18:33:29.997968 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998115 kubelet[1892]: E0412 18:33:29.998099 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998115 kubelet[1892]: W0412 18:33:29.998111 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998176 kubelet[1892]: E0412 18:33:29.998131 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998309 kubelet[1892]: E0412 18:33:29.998296 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998309 kubelet[1892]: W0412 18:33:29.998307 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998367 kubelet[1892]: E0412 18:33:29.998318 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998454 kubelet[1892]: E0412 18:33:29.998434 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998454 kubelet[1892]: W0412 18:33:29.998453 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998514 kubelet[1892]: E0412 18:33:29.998463 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998608 kubelet[1892]: E0412 18:33:29.998596 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998608 kubelet[1892]: W0412 18:33:29.998607 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998668 kubelet[1892]: E0412 18:33:29.998617 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998764 kubelet[1892]: E0412 18:33:29.998746 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998764 kubelet[1892]: W0412 18:33:29.998763 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998827 kubelet[1892]: E0412 18:33:29.998773 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.998929 kubelet[1892]: E0412 18:33:29.998916 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.998929 kubelet[1892]: W0412 18:33:29.998928 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.998986 kubelet[1892]: E0412 18:33:29.998938 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999073 kubelet[1892]: E0412 18:33:29.999054 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999073 kubelet[1892]: W0412 18:33:29.999072 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999131 kubelet[1892]: E0412 18:33:29.999081 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999215 kubelet[1892]: E0412 18:33:29.999196 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999215 kubelet[1892]: W0412 18:33:29.999214 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999281 kubelet[1892]: E0412 18:33:29.999224 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999346 kubelet[1892]: E0412 18:33:29.999335 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999377 kubelet[1892]: W0412 18:33:29.999350 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999377 kubelet[1892]: E0412 18:33:29.999359 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999530 kubelet[1892]: E0412 18:33:29.999513 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999530 kubelet[1892]: W0412 18:33:29.999528 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999605 kubelet[1892]: E0412 18:33:29.999540 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999696 kubelet[1892]: E0412 18:33:29.999672 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999696 kubelet[1892]: W0412 18:33:29.999692 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999749 kubelet[1892]: E0412 18:33:29.999703 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999826 kubelet[1892]: E0412 18:33:29.999812 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999853 kubelet[1892]: W0412 18:33:29.999829 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999853 kubelet[1892]: E0412 18:33:29.999840 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:29.999964 kubelet[1892]: E0412 18:33:29.999950 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:29.999993 kubelet[1892]: W0412 18:33:29.999967 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:29.999993 kubelet[1892]: E0412 18:33:29.999976 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.000197 kubelet[1892]: E0412 18:33:30.000183 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.000197 kubelet[1892]: W0412 18:33:30.000194 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.000267 kubelet[1892]: E0412 18:33:30.000204 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.000351 kubelet[1892]: E0412 18:33:30.000338 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.000351 kubelet[1892]: W0412 18:33:30.000349 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.000410 kubelet[1892]: E0412 18:33:30.000360 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.000509 kubelet[1892]: E0412 18:33:30.000497 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.000509 kubelet[1892]: W0412 18:33:30.000509 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.000582 kubelet[1892]: E0412 18:33:30.000518 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.000675 kubelet[1892]: E0412 18:33:30.000662 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.000675 kubelet[1892]: W0412 18:33:30.000673 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.000740 kubelet[1892]: E0412 18:33:30.000682 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.000870 kubelet[1892]: E0412 18:33:30.000856 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.000870 kubelet[1892]: W0412 18:33:30.000868 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.000924 kubelet[1892]: E0412 18:33:30.000879 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.001048 kubelet[1892]: E0412 18:33:30.001032 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.001048 kubelet[1892]: W0412 18:33:30.001044 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.001102 kubelet[1892]: E0412 18:33:30.001055 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.001246 kubelet[1892]: E0412 18:33:30.001230 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.001246 kubelet[1892]: W0412 18:33:30.001242 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.001318 kubelet[1892]: E0412 18:33:30.001262 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.001400 kubelet[1892]: E0412 18:33:30.001383 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.001400 kubelet[1892]: W0412 18:33:30.001395 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.001465 kubelet[1892]: E0412 18:33:30.001405 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.001573 kubelet[1892]: E0412 18:33:30.001544 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.001573 kubelet[1892]: W0412 18:33:30.001569 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.001631 kubelet[1892]: E0412 18:33:30.001588 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.001774 kubelet[1892]: E0412 18:33:30.001758 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.001774 kubelet[1892]: W0412 18:33:30.001770 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.001833 kubelet[1892]: E0412 18:33:30.001785 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.002226 kubelet[1892]: E0412 18:33:30.002120 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.002226 kubelet[1892]: W0412 18:33:30.002132 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.002226 kubelet[1892]: E0412 18:33:30.002152 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.002527 kubelet[1892]: E0412 18:33:30.002377 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.002527 kubelet[1892]: W0412 18:33:30.002388 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.002527 kubelet[1892]: E0412 18:33:30.002407 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.002870 kubelet[1892]: E0412 18:33:30.002720 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.002870 kubelet[1892]: W0412 18:33:30.002740 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.002870 kubelet[1892]: E0412 18:33:30.002764 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.003199 kubelet[1892]: E0412 18:33:30.003020 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.003199 kubelet[1892]: W0412 18:33:30.003032 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.003199 kubelet[1892]: E0412 18:33:30.003051 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.003304 kubelet[1892]: E0412 18:33:30.003238 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.003304 kubelet[1892]: W0412 18:33:30.003247 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.003304 kubelet[1892]: E0412 18:33:30.003269 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.003435 kubelet[1892]: E0412 18:33:30.003420 1892 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:30.003435 kubelet[1892]: W0412 18:33:30.003433 1892 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:30.003488 kubelet[1892]: E0412 18:33:30.003444 1892 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:30.404147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount27768812.mount: Deactivated successfully. Apr 12 18:33:30.556461 env[1311]: time="2024-04-12T18:33:30.556418375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:30.561257 env[1311]: time="2024-04-12T18:33:30.561220426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:30.567942 env[1311]: time="2024-04-12T18:33:30.567905596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:30.572727 env[1311]: time="2024-04-12T18:33:30.572687729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:30.573273 env[1311]: time="2024-04-12T18:33:30.573241293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:33:30.575347 env[1311]: time="2024-04-12T18:33:30.575315320Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:33:30.598678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount695629053.mount: Deactivated successfully. Apr 12 18:33:30.620908 env[1311]: time="2024-04-12T18:33:30.620859429Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b\"" Apr 12 18:33:30.621591 env[1311]: time="2024-04-12T18:33:30.621565264Z" level=info msg="StartContainer for \"26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b\"" Apr 12 18:33:30.641705 systemd[1]: Started cri-containerd-26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b.scope. Apr 12 18:33:30.656000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.656000 audit[2217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1957 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:30.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613039303936336161363666303863396430333466373966343836 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit: BPF prog-id=79 op=LOAD Apr 12 18:33:30.657000 audit[2217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1957 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:30.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613039303936336161363666303863396430333466373966343836 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.657000 audit: BPF prog-id=80 op=LOAD Apr 12 18:33:30.657000 audit[2217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1957 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:30.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613039303936336161363666303863396430333466373966343836 Apr 12 18:33:30.658000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:33:30.658000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { perfmon } for pid=2217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit[2217]: AVC avc: denied { bpf } for pid=2217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:30.658000 audit: BPF prog-id=81 op=LOAD Apr 12 18:33:30.658000 audit[2217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1957 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:30.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613039303936336161363666303863396430333466373966343836 Apr 12 18:33:30.676455 env[1311]: time="2024-04-12T18:33:30.676398776Z" level=info msg="StartContainer for \"26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b\" returns successfully" Apr 12 18:33:30.678644 systemd[1]: cri-containerd-26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b.scope: Deactivated successfully. Apr 12 18:33:30.681000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:33:30.855191 kubelet[1892]: E0412 18:33:30.855098 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:31.302054 env[1311]: time="2024-04-12T18:33:31.302004395Z" level=info msg="shim disconnected" id=26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b Apr 12 18:33:31.302054 env[1311]: time="2024-04-12T18:33:31.302054712Z" level=warning msg="cleaning up after shim disconnected" id=26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b namespace=k8s.io Apr 12 18:33:31.302242 env[1311]: time="2024-04-12T18:33:31.302064831Z" level=info msg="cleaning up dead shim" Apr 12 18:33:31.308760 env[1311]: time="2024-04-12T18:33:31.308713334Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:33:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2257 runtime=io.containerd.runc.v2\n" Apr 12 18:33:31.404321 systemd[1]: run-containerd-runc-k8s.io-26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b-runc.LlRD04.mount: Deactivated successfully. Apr 12 18:33:31.404409 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-26a090963aa66f08c9d034f79f48646e1a601cb067b01ab88558d94fb051fa5b-rootfs.mount: Deactivated successfully. Apr 12 18:33:31.856289 kubelet[1892]: E0412 18:33:31.856230 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:31.931665 kubelet[1892]: E0412 18:33:31.931302 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:31.947736 env[1311]: time="2024-04-12T18:33:31.947693986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:33:32.857493 kubelet[1892]: E0412 18:33:32.857425 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:33.035384 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2991344279.mount: Deactivated successfully. Apr 12 18:33:33.858289 kubelet[1892]: E0412 18:33:33.858241 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:33.930952 kubelet[1892]: E0412 18:33:33.930920 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:34.858875 kubelet[1892]: E0412 18:33:34.858825 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:34.915107 env[1311]: time="2024-04-12T18:33:34.915054196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:34.920096 env[1311]: time="2024-04-12T18:33:34.920062983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:34.923518 env[1311]: time="2024-04-12T18:33:34.923492743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:34.926630 env[1311]: time="2024-04-12T18:33:34.926604882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:34.927163 env[1311]: time="2024-04-12T18:33:34.927137811Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:33:34.929015 env[1311]: time="2024-04-12T18:33:34.928980383Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:33:34.951619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167356078.mount: Deactivated successfully. Apr 12 18:33:34.967372 env[1311]: time="2024-04-12T18:33:34.967299068Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515\"" Apr 12 18:33:34.968138 env[1311]: time="2024-04-12T18:33:34.968090862Z" level=info msg="StartContainer for \"083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515\"" Apr 12 18:33:34.988373 systemd[1]: run-containerd-runc-k8s.io-083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515-runc.x0dnlN.mount: Deactivated successfully. Apr 12 18:33:34.989516 systemd[1]: Started cri-containerd-083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515.scope. Apr 12 18:33:35.010724 kernel: kauditd_printk_skb: 410 callbacks suppressed Apr 12 18:33:35.010964 kernel: audit: type=1400 audit(1712946815.003:626): avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1957 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.052049 kernel: audit: type=1300 audit(1712946815.003:626): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1957 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336133656130653438343362363134366365393537303836643733 Apr 12 18:33:35.076472 kernel: audit: type=1327 audit(1712946815.003:626): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336133656130653438343362363134366365393537303836643733 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.111978 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.112129 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.129056 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.129978 env[1311]: time="2024-04-12T18:33:35.129943439Z" level=info msg="StartContainer for \"083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515\" returns successfully" Apr 12 18:33:35.146388 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.164156 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.181294 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.181351 kernel: audit: type=1400 audit(1712946815.003:627): avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit: BPF prog-id=82 op=LOAD Apr 12 18:33:35.003000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1957 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336133656130653438343362363134366365393537303836643733 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit: BPF prog-id=83 op=LOAD Apr 12 18:33:35.003000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1957 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336133656130653438343362363134366365393537303836643733 Apr 12 18:33:35.003000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:33:35.003000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.003000 audit: BPF prog-id=84 op=LOAD Apr 12 18:33:35.003000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1957 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336133656130653438343362363134366365393537303836643733 Apr 12 18:33:35.859158 kubelet[1892]: E0412 18:33:35.859120 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:35.931640 kubelet[1892]: E0412 18:33:35.931600 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:36.086358 env[1311]: time="2024-04-12T18:33:36.086297254Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:33:36.088440 systemd[1]: cri-containerd-083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515.scope: Deactivated successfully. Apr 12 18:33:36.091000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:33:36.104074 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515-rootfs.mount: Deactivated successfully. Apr 12 18:33:36.438352 kubelet[1892]: I0412 18:33:36.145892 1892 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:33:36.860477 kubelet[1892]: E0412 18:33:36.860449 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:37.134121 env[1311]: time="2024-04-12T18:33:37.133801101Z" level=info msg="shim disconnected" id=083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515 Apr 12 18:33:37.134508 env[1311]: time="2024-04-12T18:33:37.134474024Z" level=warning msg="cleaning up after shim disconnected" id=083a3ea0e4843b6146ce957086d73795a2cd95f393d2ed81a18f38b37f5e3515 namespace=k8s.io Apr 12 18:33:37.134508 env[1311]: time="2024-04-12T18:33:37.134497743Z" level=info msg="cleaning up dead shim" Apr 12 18:33:37.141924 env[1311]: time="2024-04-12T18:33:37.141872782Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:33:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2316 runtime=io.containerd.runc.v2\n" Apr 12 18:33:37.861522 kubelet[1892]: E0412 18:33:37.861478 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:37.935862 systemd[1]: Created slice kubepods-besteffort-pode0f49eee_6bc5_4b84_8eaf_447c55705651.slice. Apr 12 18:33:37.938103 env[1311]: time="2024-04-12T18:33:37.938062471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llkk,Uid:e0f49eee-6bc5-4b84-8eaf-447c55705651,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:37.961683 env[1311]: time="2024-04-12T18:33:37.961649350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:33:38.026540 env[1311]: time="2024-04-12T18:33:38.026471622Z" level=error msg="Failed to destroy network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:38.029380 env[1311]: time="2024-04-12T18:33:38.028099936Z" level=error msg="encountered an error cleaning up failed sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:38.029380 env[1311]: time="2024-04-12T18:33:38.028155573Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llkk,Uid:e0f49eee-6bc5-4b84-8eaf-447c55705651,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:38.028916 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda-shm.mount: Deactivated successfully. Apr 12 18:33:38.029707 kubelet[1892]: E0412 18:33:38.029681 1892 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:38.029771 kubelet[1892]: E0412 18:33:38.029745 1892 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:38.029771 kubelet[1892]: E0412 18:33:38.029765 1892 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5llkk" Apr 12 18:33:38.029839 kubelet[1892]: E0412 18:33:38.029828 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5llkk_calico-system(e0f49eee-6bc5-4b84-8eaf-447c55705651)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5llkk_calico-system(e0f49eee-6bc5-4b84-8eaf-447c55705651)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:38.861968 kubelet[1892]: E0412 18:33:38.861925 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:38.962773 kubelet[1892]: I0412 18:33:38.962733 1892 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:38.963484 env[1311]: time="2024-04-12T18:33:38.963444049Z" level=info msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" Apr 12 18:33:38.987220 env[1311]: time="2024-04-12T18:33:38.987176910Z" level=error msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" failed" error="failed to destroy network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:38.987744 kubelet[1892]: E0412 18:33:38.987717 1892 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:38.987846 kubelet[1892]: E0412 18:33:38.987818 1892 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda"} Apr 12 18:33:38.987905 kubelet[1892]: E0412 18:33:38.987889 1892 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e0f49eee-6bc5-4b84-8eaf-447c55705651\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:38.987966 kubelet[1892]: E0412 18:33:38.987933 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e0f49eee-6bc5-4b84-8eaf-447c55705651\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5llkk" podUID="e0f49eee-6bc5-4b84-8eaf-447c55705651" Apr 12 18:33:39.862886 kubelet[1892]: E0412 18:33:39.862844 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:39.903632 kubelet[1892]: I0412 18:33:39.903595 1892 topology_manager.go:215] "Topology Admit Handler" podUID="633af25e-89c3-49f2-8639-e802dfc98ca4" podNamespace="default" podName="nginx-deployment-6d5f899847-jhq7q" Apr 12 18:33:39.908648 systemd[1]: Created slice kubepods-besteffort-pod633af25e_89c3_49f2_8639_e802dfc98ca4.slice. Apr 12 18:33:40.046792 kubelet[1892]: I0412 18:33:40.046751 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dbmf\" (UniqueName: \"kubernetes.io/projected/633af25e-89c3-49f2-8639-e802dfc98ca4-kube-api-access-9dbmf\") pod \"nginx-deployment-6d5f899847-jhq7q\" (UID: \"633af25e-89c3-49f2-8639-e802dfc98ca4\") " pod="default/nginx-deployment-6d5f899847-jhq7q" Apr 12 18:33:40.212338 env[1311]: time="2024-04-12T18:33:40.212305464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jhq7q,Uid:633af25e-89c3-49f2-8639-e802dfc98ca4,Namespace:default,Attempt:0,}" Apr 12 18:33:40.326814 env[1311]: time="2024-04-12T18:33:40.326762709Z" level=error msg="Failed to destroy network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:40.328420 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472-shm.mount: Deactivated successfully. Apr 12 18:33:40.329315 env[1311]: time="2024-04-12T18:33:40.329278661Z" level=error msg="encountered an error cleaning up failed sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:40.329432 env[1311]: time="2024-04-12T18:33:40.329407335Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jhq7q,Uid:633af25e-89c3-49f2-8639-e802dfc98ca4,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:40.329787 kubelet[1892]: E0412 18:33:40.329752 1892 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:40.329865 kubelet[1892]: E0412 18:33:40.329813 1892 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jhq7q" Apr 12 18:33:40.329865 kubelet[1892]: E0412 18:33:40.329834 1892 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jhq7q" Apr 12 18:33:40.329916 kubelet[1892]: E0412 18:33:40.329888 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-jhq7q_default(633af25e-89c3-49f2-8639-e802dfc98ca4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-jhq7q_default(633af25e-89c3-49f2-8639-e802dfc98ca4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jhq7q" podUID="633af25e-89c3-49f2-8639-e802dfc98ca4" Apr 12 18:33:40.863859 kubelet[1892]: E0412 18:33:40.863804 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:40.966515 kubelet[1892]: I0412 18:33:40.966012 1892 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:40.966794 env[1311]: time="2024-04-12T18:33:40.966765145Z" level=info msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" Apr 12 18:33:41.015334 env[1311]: time="2024-04-12T18:33:41.015267946Z" level=error msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" failed" error="failed to destroy network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:41.015737 kubelet[1892]: E0412 18:33:41.015609 1892 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:41.015737 kubelet[1892]: E0412 18:33:41.015651 1892 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472"} Apr 12 18:33:41.015737 kubelet[1892]: E0412 18:33:41.015684 1892 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"633af25e-89c3-49f2-8639-e802dfc98ca4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:41.015737 kubelet[1892]: E0412 18:33:41.015710 1892 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"633af25e-89c3-49f2-8639-e802dfc98ca4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jhq7q" podUID="633af25e-89c3-49f2-8639-e802dfc98ca4" Apr 12 18:33:41.864924 kubelet[1892]: E0412 18:33:41.864880 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:42.769391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount112732574.mount: Deactivated successfully. Apr 12 18:33:42.865142 kubelet[1892]: E0412 18:33:42.865088 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:43.172629 env[1311]: time="2024-04-12T18:33:43.172506645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:43.182203 env[1311]: time="2024-04-12T18:33:43.182164668Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:43.187918 env[1311]: time="2024-04-12T18:33:43.187883638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:43.193370 env[1311]: time="2024-04-12T18:33:43.193337180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:43.193957 env[1311]: time="2024-04-12T18:33:43.193928792Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:33:43.206933 env[1311]: time="2024-04-12T18:33:43.206888619Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:33:43.241017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount880319570.mount: Deactivated successfully. Apr 12 18:33:43.260490 env[1311]: time="2024-04-12T18:33:43.260424567Z" level=info msg="CreateContainer within sandbox \"4a798c5ea03f7889c00d81dbf229130dd76eb1fef4f7e213e23141d149782f0f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9\"" Apr 12 18:33:43.261169 env[1311]: time="2024-04-12T18:33:43.261121574Z" level=info msg="StartContainer for \"54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9\"" Apr 12 18:33:43.275413 systemd[1]: Started cri-containerd-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9.scope. Apr 12 18:33:43.297583 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:33:43.297714 kernel: audit: type=1400 audit(1712946823.291:633): avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1957 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:43.339350 kernel: audit: type=1300 audit(1712946823.291:633): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1957 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:43.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653465356261633931333931653837623335656265373935303334 Apr 12 18:33:43.362982 kernel: audit: type=1327 audit(1712946823.291:633): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653465356261633931333931653837623335656265373935303334 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.379745 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.397131 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.415883 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.415997 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.450845 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.450949 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.468197 env[1311]: time="2024-04-12T18:33:43.468159382Z" level=info msg="StartContainer for \"54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9\" returns successfully" Apr 12 18:33:43.484738 kernel: audit: type=1400 audit(1712946823.291:634): avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit: BPF prog-id=85 op=LOAD Apr 12 18:33:43.291000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1957 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:43.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653465356261633931333931653837623335656265373935303334 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit: BPF prog-id=86 op=LOAD Apr 12 18:33:43.291000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1957 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:43.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653465356261633931333931653837623335656265373935303334 Apr 12 18:33:43.291000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:33:43.291000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:43.291000 audit: BPF prog-id=87 op=LOAD Apr 12 18:33:43.291000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1957 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:43.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653465356261633931333931653837623335656265373935303334 Apr 12 18:33:43.851955 kubelet[1892]: E0412 18:33:43.850966 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:43.866129 kubelet[1892]: E0412 18:33:43.866104 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:43.951503 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:33:43.951630 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:33:43.988332 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.Y353Rz.mount: Deactivated successfully. Apr 12 18:33:43.992958 kubelet[1892]: I0412 18:33:43.992745 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-qqj2g" podStartSLOduration=3.422889414 podCreationTimestamp="2024-04-12 18:33:25 +0000 UTC" firstStartedPulling="2024-04-12 18:33:27.624844239 +0000 UTC m=+4.752367075" lastFinishedPulling="2024-04-12 18:33:43.194660277 +0000 UTC m=+20.322183113" observedRunningTime="2024-04-12 18:33:43.992075162 +0000 UTC m=+21.119597998" watchObservedRunningTime="2024-04-12 18:33:43.992705452 +0000 UTC m=+21.120228288" Apr 12 18:33:44.866701 kubelet[1892]: E0412 18:33:44.866665 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:44.991887 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.2Jbq4U.mount: Deactivated successfully. Apr 12 18:33:45.226000 audit[2587]: AVC avc: denied { write } for pid=2587 comm="tee" name="fd" dev="proc" ino=18531 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.226000 audit[2587]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdd7e97d a2=241 a3=1b6 items=1 ppid=2556 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.226000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:33:45.226000 audit: PATH item=0 name="/dev/fd/63" inode=18528 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.226000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.246000 audit[2613]: AVC avc: denied { write } for pid=2613 comm="tee" name="fd" dev="proc" ino=18545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.247000 audit[2616]: AVC avc: denied { write } for pid=2616 comm="tee" name="fd" dev="proc" ino=18548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.248000 audit[2606]: AVC avc: denied { write } for pid=2606 comm="tee" name="fd" dev="proc" ino=17868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.248000 audit[2606]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7b3c97d a2=241 a3=1b6 items=1 ppid=2553 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.248000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:33:45.248000 audit: PATH item=0 name="/dev/fd/63" inode=17860 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.248000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.246000 audit[2613]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1d5997f a2=241 a3=1b6 items=1 ppid=2557 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.246000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:33:45.246000 audit: PATH item=0 name="/dev/fd/63" inode=18541 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.247000 audit[2616]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe55f896d a2=241 a3=1b6 items=1 ppid=2560 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.247000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:33:45.247000 audit: PATH item=0 name="/dev/fd/63" inode=18542 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.247000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.258000 audit[2618]: AVC avc: denied { write } for pid=2618 comm="tee" name="fd" dev="proc" ino=18559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.258000 audit[2618]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc89c997d a2=241 a3=1b6 items=1 ppid=2552 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.258000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:33:45.258000 audit: PATH item=0 name="/dev/fd/63" inode=17862 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.268000 audit[2614]: AVC avc: denied { write } for pid=2614 comm="tee" name="fd" dev="proc" ino=17877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.268000 audit[2614]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2f7e97e a2=241 a3=1b6 items=1 ppid=2559 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.268000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:33:45.268000 audit: PATH item=0 name="/dev/fd/63" inode=17861 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.271000 audit[2627]: AVC avc: denied { write } for pid=2627 comm="tee" name="fd" dev="proc" ino=18564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:45.271000 audit[2627]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef4fa96e a2=241 a3=1b6 items=1 ppid=2571 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.271000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:33:45.271000 audit: PATH item=0 name="/dev/fd/63" inode=17879 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:45.271000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:45.717581 kernel: Initializing XFRM netlink socket Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.818000 audit: BPF prog-id=88 op=LOAD Apr 12 18:33:45.818000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7413868 a2=70 a3=ffffc74138d8 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.818000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.819000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.819000 audit: BPF prog-id=89 op=LOAD Apr 12 18:33:45.819000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7413868 a2=70 a3=4b243c items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.820000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc7413820 a2=70 a3=ffffc7413890 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.820000 audit: BPF prog-id=90 op=LOAD Apr 12 18:33:45.820000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc7413808 a2=70 a3=ffffc7413878 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.821000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:33:45.821000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.821000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc74138d8 a2=70 a3=0 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.821000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.821000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc74138c8 a2=70 a3=0 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.821000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.821000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7413838 a2=70 a3=0 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc7413910 a2=70 a3=9a739ef items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc7413910 a2=70 a3=9a739ef items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.822000 audit: BPF prog-id=91 op=LOAD Apr 12 18:33:45.822000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7413838 a2=70 a3=9a73a09 items=0 ppid=2555 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:45.825000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.825000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde6356f8 a2=70 a3=ffffde635768 items=0 ppid=2555 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:33:45.826000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.826000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde6355c8 a2=70 a3=ffffde635638 items=0 ppid=2555 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:33:45.833000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:33:45.866957 kubelet[1892]: E0412 18:33:45.866889 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:46.023000 audit[2719]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:46.023000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffd060060 a2=0 a3=ffffb86c2fa8 items=0 ppid=2555 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.023000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:46.045000 audit[2717]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:46.045000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd82c45c0 a2=0 a3=ffff95119fa8 items=0 ppid=2555 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.045000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:46.579000 audit[2721]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:46.579000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe533e080 a2=0 a3=ffffbaacefa8 items=0 ppid=2555 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.579000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:46.581000 audit[2718]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:46.581000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffcce48f0 a2=0 a3=ffff8a9f0fa8 items=0 ppid=2555 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.581000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:46.744446 systemd-networkd[1461]: vxlan.calico: Link UP Apr 12 18:33:46.744457 systemd-networkd[1461]: vxlan.calico: Gained carrier Apr 12 18:33:46.867685 kubelet[1892]: E0412 18:33:46.867592 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:47.868398 kubelet[1892]: E0412 18:33:47.868349 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:48.304736 systemd-networkd[1461]: vxlan.calico: Gained IPv6LL Apr 12 18:33:48.869059 kubelet[1892]: E0412 18:33:48.869028 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:49.869401 kubelet[1892]: E0412 18:33:49.869361 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:50.870443 kubelet[1892]: E0412 18:33:50.870399 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:51.871292 kubelet[1892]: E0412 18:33:51.871239 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:51.932174 env[1311]: time="2024-04-12T18:33:51.932051597Z" level=info msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] k8s.go 585: Cleaning up netns ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" iface="eth0" netns="/var/run/netns/cni-1987e827-8548-cf46-3109-ba87cb625a42" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" iface="eth0" netns="/var/run/netns/cni-1987e827-8548-cf46-3109-ba87cb625a42" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" iface="eth0" netns="/var/run/netns/cni-1987e827-8548-cf46-3109-ba87cb625a42" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] k8s.go 592: Releasing IP address(es) ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.970 [INFO][2755] utils.go 188: Calico CNI releasing IP address ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.988 [INFO][2762] ipam_plugin.go 415: Releasing address using handleID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.988 [INFO][2762] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.988 [INFO][2762] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.999 [WARNING][2762] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:51.999 [INFO][2762] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:52.000 [INFO][2762] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:52.002894 env[1311]: 2024-04-12 18:33:52.001 [INFO][2755] k8s.go 598: Teardown processing complete. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:33:52.004950 env[1311]: time="2024-04-12T18:33:52.004911540Z" level=info msg="TearDown network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" successfully" Apr 12 18:33:52.005056 env[1311]: time="2024-04-12T18:33:52.005039575Z" level=info msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" returns successfully" Apr 12 18:33:52.005874 env[1311]: time="2024-04-12T18:33:52.005846583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jhq7q,Uid:633af25e-89c3-49f2-8639-e802dfc98ca4,Namespace:default,Attempt:1,}" Apr 12 18:33:52.006009 systemd[1]: run-netns-cni\x2d1987e827\x2d8548\x2dcf46\x2d3109\x2dba87cb625a42.mount: Deactivated successfully. Apr 12 18:33:52.213883 systemd-networkd[1461]: cali4d77f2dc7b4: Link UP Apr 12 18:33:52.226028 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:33:52.226211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d77f2dc7b4: link becomes ready Apr 12 18:33:52.226282 systemd-networkd[1461]: cali4d77f2dc7b4: Gained carrier Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.086 [INFO][2768] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0 nginx-deployment-6d5f899847- default 633af25e-89c3-49f2-8639-e802dfc98ca4 1232 0 2024-04-12 18:33:39 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.39 nginx-deployment-6d5f899847-jhq7q eth0 default [] [] [kns.default ksa.default.default] cali4d77f2dc7b4 [] []}} ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.086 [INFO][2768] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.112 [INFO][2780] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" HandleID="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.125 [INFO][2780] ipam_plugin.go 268: Auto assigning IP ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" HandleID="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263800), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"nginx-deployment-6d5f899847-jhq7q", "timestamp":"2024-04-12 18:33:52.112896208 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.125 [INFO][2780] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.125 [INFO][2780] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.125 [INFO][2780] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.127 [INFO][2780] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.130 [INFO][2780] ipam.go 372: Looking up existing affinities for host host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.135 [INFO][2780] ipam.go 489: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.137 [INFO][2780] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.139 [INFO][2780] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.139 [INFO][2780] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.143 [INFO][2780] ipam.go 1682: Creating new handle: k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39 Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.164 [INFO][2780] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.209 [INFO][2780] ipam.go 1216: Successfully claimed IPs: [192.168.99.1/26] block=192.168.99.0/26 handle="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.209 [INFO][2780] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.1/26] handle="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" host="10.200.20.39" Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.209 [INFO][2780] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:52.242624 env[1311]: 2024-04-12 18:33:52.209 [INFO][2780] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.1/26] IPv6=[] ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" HandleID="k8s-pod-network.4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.211 [INFO][2768] k8s.go 385: Populated endpoint ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"633af25e-89c3-49f2-8639-e802dfc98ca4", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"nginx-deployment-6d5f899847-jhq7q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4d77f2dc7b4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.211 [INFO][2768] k8s.go 386: Calico CNI using IPs: [192.168.99.1/32] ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.211 [INFO][2768] dataplane_linux.go 68: Setting the host side veth name to cali4d77f2dc7b4 ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.227 [INFO][2768] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.227 [INFO][2768] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"633af25e-89c3-49f2-8639-e802dfc98ca4", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39", Pod:"nginx-deployment-6d5f899847-jhq7q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4d77f2dc7b4", MAC:"22:0d:8a:81:f0:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:52.248008 env[1311]: 2024-04-12 18:33:52.240 [INFO][2768] k8s.go 498: Wrote updated endpoint to datastore ContainerID="4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39" Namespace="default" Pod="nginx-deployment-6d5f899847-jhq7q" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:33:52.265000 audit[2816]: NETFILTER_CFG table=filter:72 family=2 entries=36 op=nft_register_chain pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:52.270728 env[1311]: time="2024-04-12T18:33:52.264468936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:52.270728 env[1311]: time="2024-04-12T18:33:52.264503495Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:52.270728 env[1311]: time="2024-04-12T18:33:52.264516814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:52.270728 env[1311]: time="2024-04-12T18:33:52.265107471Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39 pid=2811 runtime=io.containerd.runc.v2 Apr 12 18:33:52.270982 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:33:52.271140 kernel: audit: type=1325 audit(1712946832.265:666): table=filter:72 family=2 entries=36 op=nft_register_chain pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:52.265000 audit[2816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20372 a0=3 a1=ffffd3df6000 a2=0 a3=ffffbdbd5fa8 items=0 ppid=2555 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.289267 systemd[1]: Started cri-containerd-4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39.scope. Apr 12 18:33:52.312043 kernel: audit: type=1300 audit(1712946832.265:666): arch=c00000b7 syscall=211 success=yes exit=20372 a0=3 a1=ffffd3df6000 a2=0 a3=ffffbdbd5fa8 items=0 ppid=2555 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:52.327751 kernel: audit: type=1327 audit(1712946832.265:666): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.346010 kernel: audit: type=1400 audit(1712946832.305:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.363605 kernel: audit: type=1400 audit(1712946832.305:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.401224 kernel: audit: type=1400 audit(1712946832.305:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.401287 kernel: audit: type=1400 audit(1712946832.305:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.419420 kernel: audit: type=1400 audit(1712946832.305:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.436465 kernel: audit: type=1400 audit(1712946832.305:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.453331 kernel: audit: type=1400 audit(1712946832.305:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.454262 env[1311]: time="2024-04-12T18:33:52.454225055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jhq7q,Uid:633af25e-89c3-49f2-8639-e802dfc98ca4,Namespace:default,Attempt:1,} returns sandbox id \"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39\"" Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.310000 audit: BPF prog-id=92 op=LOAD Apr 12 18:33:52.310000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.310000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2811 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462376236653963393530373934363863316265343338626331303736 Apr 12 18:33:52.310000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.310000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2811 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462376236653963393530373934363863316265343338626331303736 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit: BPF prog-id=93 op=LOAD Apr 12 18:33:52.311000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2811 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462376236653963393530373934363863316265343338626331303736 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit: BPF prog-id=94 op=LOAD Apr 12 18:33:52.311000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2811 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462376236653963393530373934363863316265343338626331303736 Apr 12 18:33:52.311000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:33:52.311000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:52.311000 audit: BPF prog-id=95 op=LOAD Apr 12 18:33:52.311000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2811 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462376236653963393530373934363863316265343338626331303736 Apr 12 18:33:52.457684 env[1311]: time="2024-04-12T18:33:52.457658201Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:33:52.871954 kubelet[1892]: E0412 18:33:52.871919 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:52.931465 env[1311]: time="2024-04-12T18:33:52.931317206Z" level=info msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" Apr 12 18:33:53.004871 systemd[1]: run-containerd-runc-k8s.io-4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39-runc.7LKG7D.mount: Deactivated successfully. Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.970 [INFO][2858] k8s.go 585: Cleaning up netns ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.971 [INFO][2858] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" iface="eth0" netns="/var/run/netns/cni-5a16df0e-396d-3773-0972-d15e61661abd" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.971 [INFO][2858] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" iface="eth0" netns="/var/run/netns/cni-5a16df0e-396d-3773-0972-d15e61661abd" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.971 [INFO][2858] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" iface="eth0" netns="/var/run/netns/cni-5a16df0e-396d-3773-0972-d15e61661abd" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.971 [INFO][2858] k8s.go 592: Releasing IP address(es) ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.971 [INFO][2858] utils.go 188: Calico CNI releasing IP address ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.989 [INFO][2865] ipam_plugin.go 415: Releasing address using handleID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.989 [INFO][2865] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:52.989 [INFO][2865] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:53.001 [WARNING][2865] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:53.001 [INFO][2865] ipam_plugin.go 443: Releasing address using workloadID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:53.002 [INFO][2865] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:53.006785 env[1311]: 2024-04-12 18:33:53.005 [INFO][2858] k8s.go 598: Teardown processing complete. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:33:53.009625 systemd[1]: run-netns-cni\x2d5a16df0e\x2d396d\x2d3773\x2d0972\x2dd15e61661abd.mount: Deactivated successfully. Apr 12 18:33:53.009877 env[1311]: time="2024-04-12T18:33:53.009821590Z" level=info msg="TearDown network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" successfully" Apr 12 18:33:53.009985 env[1311]: time="2024-04-12T18:33:53.009967105Z" level=info msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" returns successfully" Apr 12 18:33:53.010599 env[1311]: time="2024-04-12T18:33:53.010534603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llkk,Uid:e0f49eee-6bc5-4b84-8eaf-447c55705651,Namespace:calico-system,Attempt:1,}" Apr 12 18:33:53.158190 systemd-networkd[1461]: calic9a6bd9ac41: Link UP Apr 12 18:33:53.167640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic9a6bd9ac41: link becomes ready Apr 12 18:33:53.168094 systemd-networkd[1461]: calic9a6bd9ac41: Gained carrier Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.094 [INFO][2871] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-csi--node--driver--5llkk-eth0 csi-node-driver- calico-system e0f49eee-6bc5-4b84-8eaf-447c55705651 1239 0 2024-04-12 18:33:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.39 csi-node-driver-5llkk eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic9a6bd9ac41 [] []}} ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.094 [INFO][2871] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.116 [INFO][2884] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" HandleID="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.128 [INFO][2884] ipam_plugin.go 268: Auto assigning IP ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" HandleID="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef5f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.39", "pod":"csi-node-driver-5llkk", "timestamp":"2024-04-12 18:33:53.1163212 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.128 [INFO][2884] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.128 [INFO][2884] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.128 [INFO][2884] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.130 [INFO][2884] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.133 [INFO][2884] ipam.go 372: Looking up existing affinities for host host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.137 [INFO][2884] ipam.go 489: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.138 [INFO][2884] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.140 [INFO][2884] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.141 [INFO][2884] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.142 [INFO][2884] ipam.go 1682: Creating new handle: k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73 Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.146 [INFO][2884] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.152 [INFO][2884] ipam.go 1216: Successfully claimed IPs: [192.168.99.2/26] block=192.168.99.0/26 handle="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.152 [INFO][2884] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.2/26] handle="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" host="10.200.20.39" Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.152 [INFO][2884] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:53.178640 env[1311]: 2024-04-12 18:33:53.152 [INFO][2884] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.2/26] IPv6=[] ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" HandleID="k8s-pod-network.d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.154 [INFO][2871] k8s.go 385: Populated endpoint ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--5llkk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f49eee-6bc5-4b84-8eaf-447c55705651", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"csi-node-driver-5llkk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic9a6bd9ac41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.154 [INFO][2871] k8s.go 386: Calico CNI using IPs: [192.168.99.2/32] ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.154 [INFO][2871] dataplane_linux.go 68: Setting the host side veth name to calic9a6bd9ac41 ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.168 [INFO][2871] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.169 [INFO][2871] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--5llkk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f49eee-6bc5-4b84-8eaf-447c55705651", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73", Pod:"csi-node-driver-5llkk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic9a6bd9ac41", MAC:"da:bd:6e:d4:0c:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:53.179886 env[1311]: 2024-04-12 18:33:53.176 [INFO][2871] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73" Namespace="calico-system" Pod="csi-node-driver-5llkk" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:33:53.188000 audit[2906]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:53.188000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffe20ed260 a2=0 a3=ffff89a46fa8 items=0 ppid=2555 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.188000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:53.198701 env[1311]: time="2024-04-12T18:33:53.198627014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:53.198701 env[1311]: time="2024-04-12T18:33:53.198678572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:53.198875 env[1311]: time="2024-04-12T18:33:53.198689371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:53.198932 env[1311]: time="2024-04-12T18:33:53.198899643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73 pid=2914 runtime=io.containerd.runc.v2 Apr 12 18:33:53.211120 systemd[1]: Started cri-containerd-d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73.scope. Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit: BPF prog-id=96 op=LOAD Apr 12 18:33:53.224000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430316435333939623033613536353431616463643338656663353665 Apr 12 18:33:53.224000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.224000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430316435333939623033613536353431616463643338656663353665 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit: BPF prog-id=97 op=LOAD Apr 12 18:33:53.225000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430316435333939623033613536353431616463643338656663353665 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.225000 audit: BPF prog-id=98 op=LOAD Apr 12 18:33:53.225000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430316435333939623033613536353431616463643338656663353665 Apr 12 18:33:53.226000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:33:53.226000 audit: BPF prog-id=97 op=UNLOAD Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:53.226000 audit: BPF prog-id=99 op=LOAD Apr 12 18:33:53.226000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:53.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430316435333939623033613536353431616463643338656663353665 Apr 12 18:33:53.238792 env[1311]: time="2024-04-12T18:33:53.238754040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llkk,Uid:e0f49eee-6bc5-4b84-8eaf-447c55705651,Namespace:calico-system,Attempt:1,} returns sandbox id \"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73\"" Apr 12 18:33:53.680806 systemd-networkd[1461]: cali4d77f2dc7b4: Gained IPv6LL Apr 12 18:33:53.873103 kubelet[1892]: E0412 18:33:53.873049 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:54.384707 systemd-networkd[1461]: calic9a6bd9ac41: Gained IPv6LL Apr 12 18:33:54.845285 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount665945317.mount: Deactivated successfully. Apr 12 18:33:54.873978 kubelet[1892]: E0412 18:33:54.873922 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:55.738495 env[1311]: time="2024-04-12T18:33:55.738437040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:55.749564 env[1311]: time="2024-04-12T18:33:55.748366435Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:55.752675 env[1311]: time="2024-04-12T18:33:55.752642438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:55.757239 env[1311]: time="2024-04-12T18:33:55.757207030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:55.757537 env[1311]: time="2024-04-12T18:33:55.757511699Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:33:55.758645 env[1311]: time="2024-04-12T18:33:55.758613738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:33:55.759529 env[1311]: time="2024-04-12T18:33:55.759503306Z" level=info msg="CreateContainer within sandbox \"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:33:55.794139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount287601920.mount: Deactivated successfully. Apr 12 18:33:55.808609 env[1311]: time="2024-04-12T18:33:55.808573184Z" level=info msg="CreateContainer within sandbox \"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"053d410f26dba22853f617569ffaa83a72df8d74933fd208a12080b75eb1e8f3\"" Apr 12 18:33:55.809407 env[1311]: time="2024-04-12T18:33:55.809386354Z" level=info msg="StartContainer for \"053d410f26dba22853f617569ffaa83a72df8d74933fd208a12080b75eb1e8f3\"" Apr 12 18:33:55.825110 systemd[1]: Started cri-containerd-053d410f26dba22853f617569ffaa83a72df8d74933fd208a12080b75eb1e8f3.scope. Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.836000 audit: BPF prog-id=100 op=LOAD Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2811 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336434313066323664626132323835336636313735363966666161 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2811 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336434313066323664626132323835336636313735363966666161 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit: BPF prog-id=101 op=LOAD Apr 12 18:33:55.837000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2811 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336434313066323664626132323835336636313735363966666161 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit: BPF prog-id=102 op=LOAD Apr 12 18:33:55.837000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2811 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336434313066323664626132323835336636313735363966666161 Apr 12 18:33:55.837000 audit: BPF prog-id=102 op=UNLOAD Apr 12 18:33:55.837000 audit: BPF prog-id=101 op=UNLOAD Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:55.837000 audit: BPF prog-id=103 op=LOAD Apr 12 18:33:55.837000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2811 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336434313066323664626132323835336636313735363966666161 Apr 12 18:33:55.854444 env[1311]: time="2024-04-12T18:33:55.854404100Z" level=info msg="StartContainer for \"053d410f26dba22853f617569ffaa83a72df8d74933fd208a12080b75eb1e8f3\" returns successfully" Apr 12 18:33:55.874660 kubelet[1892]: E0412 18:33:55.874602 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:56.001470 kubelet[1892]: I0412 18:33:56.001369 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-jhq7q" podStartSLOduration=13.700544761 podCreationTimestamp="2024-04-12 18:33:39 +0000 UTC" firstStartedPulling="2024-04-12 18:33:52.457098022 +0000 UTC m=+29.584620858" lastFinishedPulling="2024-04-12 18:33:55.757879445 +0000 UTC m=+32.885402241" observedRunningTime="2024-04-12 18:33:56.000969877 +0000 UTC m=+33.128492713" watchObservedRunningTime="2024-04-12 18:33:56.001326144 +0000 UTC m=+33.128848980" Apr 12 18:33:56.874889 kubelet[1892]: E0412 18:33:56.874847 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:56.960221 env[1311]: time="2024-04-12T18:33:56.960175372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:56.968098 env[1311]: time="2024-04-12T18:33:56.968058048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:56.972200 env[1311]: time="2024-04-12T18:33:56.972175339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:56.977103 env[1311]: time="2024-04-12T18:33:56.977077443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:56.977370 env[1311]: time="2024-04-12T18:33:56.977342753Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:33:56.979160 env[1311]: time="2024-04-12T18:33:56.979130729Z" level=info msg="CreateContainer within sandbox \"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:33:57.009179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3203082654.mount: Deactivated successfully. Apr 12 18:33:57.024915 env[1311]: time="2024-04-12T18:33:57.024877938Z" level=info msg="CreateContainer within sandbox \"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a0208881dcec8772151a7368c05832e77e2bb32a1b8b39b1c940f7386f69264a\"" Apr 12 18:33:57.025485 env[1311]: time="2024-04-12T18:33:57.025451957Z" level=info msg="StartContainer for \"a0208881dcec8772151a7368c05832e77e2bb32a1b8b39b1c940f7386f69264a\"" Apr 12 18:33:57.045268 systemd[1]: Started cri-containerd-a0208881dcec8772151a7368c05832e77e2bb32a1b8b39b1c940f7386f69264a.scope. Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2914 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:57.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130323038383831646365633837373231353161373336386330353833 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.059000 audit: BPF prog-id=104 op=LOAD Apr 12 18:33:57.059000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2914 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:57.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130323038383831646365633837373231353161373336386330353833 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit: BPF prog-id=105 op=LOAD Apr 12 18:33:57.060000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2914 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130323038383831646365633837373231353161373336386330353833 Apr 12 18:33:57.060000 audit: BPF prog-id=105 op=UNLOAD Apr 12 18:33:57.060000 audit: BPF prog-id=104 op=UNLOAD Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:57.060000 audit: BPF prog-id=106 op=LOAD Apr 12 18:33:57.060000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2914 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130323038383831646365633837373231353161373336386330353833 Apr 12 18:33:57.080826 env[1311]: time="2024-04-12T18:33:57.080777323Z" level=info msg="StartContainer for \"a0208881dcec8772151a7368c05832e77e2bb32a1b8b39b1c940f7386f69264a\" returns successfully" Apr 12 18:33:57.082250 env[1311]: time="2024-04-12T18:33:57.082208872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:33:57.791848 systemd[1]: run-containerd-runc-k8s.io-a0208881dcec8772151a7368c05832e77e2bb32a1b8b39b1c940f7386f69264a-runc.n1eLAc.mount: Deactivated successfully. Apr 12 18:33:57.875032 kubelet[1892]: E0412 18:33:57.874980 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:58.372819 env[1311]: time="2024-04-12T18:33:58.372770292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:58.382819 env[1311]: time="2024-04-12T18:33:58.382785905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:58.390390 env[1311]: time="2024-04-12T18:33:58.390349563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:58.395013 env[1311]: time="2024-04-12T18:33:58.394985722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:58.395342 env[1311]: time="2024-04-12T18:33:58.395313111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:33:58.397533 env[1311]: time="2024-04-12T18:33:58.397502955Z" level=info msg="CreateContainer within sandbox \"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:33:58.423343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4090387246.mount: Deactivated successfully. Apr 12 18:33:58.438523 env[1311]: time="2024-04-12T18:33:58.438480415Z" level=info msg="CreateContainer within sandbox \"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d78d9414e4a97c74b463e44677c7a9a2bd3445c1e5731e02b9e9da75c1c559fa\"" Apr 12 18:33:58.439095 env[1311]: time="2024-04-12T18:33:58.439073994Z" level=info msg="StartContainer for \"d78d9414e4a97c74b463e44677c7a9a2bd3445c1e5731e02b9e9da75c1c559fa\"" Apr 12 18:33:58.456780 systemd[1]: Started cri-containerd-d78d9414e4a97c74b463e44677c7a9a2bd3445c1e5731e02b9e9da75c1c559fa.scope. Apr 12 18:33:58.483418 kernel: kauditd_printk_skb: 210 callbacks suppressed Apr 12 18:33:58.483566 kernel: audit: type=1400 audit(1712946838.472:728): avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2914 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.522527 kernel: audit: type=1300 audit(1712946838.472:728): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2914 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386439343134653461393763373462343633653434363737633761 Apr 12 18:33:58.546059 kernel: audit: type=1327 audit(1712946838.472:728): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386439343134653461393763373462343633653434363737633761 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.562925 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.579906 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.596571 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.614000 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.617844 env[1311]: time="2024-04-12T18:33:58.617803040Z" level=info msg="StartContainer for \"d78d9414e4a97c74b463e44677c7a9a2bd3445c1e5731e02b9e9da75c1c559fa\" returns successfully" Apr 12 18:33:58.631340 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.631463 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.665198 kernel: audit: type=1400 audit(1712946838.472:729): avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit: BPF prog-id=107 op=LOAD Apr 12 18:33:58.472000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2914 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386439343134653461393763373462343633653434363737633761 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit: BPF prog-id=108 op=LOAD Apr 12 18:33:58.472000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2914 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386439343134653461393763373462343633653434363737633761 Apr 12 18:33:58.472000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:33:58.472000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:58.472000 audit: BPF prog-id=109 op=LOAD Apr 12 18:33:58.472000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2914 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386439343134653461393763373462343633653434363737633761 Apr 12 18:33:58.875448 kubelet[1892]: E0412 18:33:58.875407 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:33:58.935313 kubelet[1892]: I0412 18:33:58.934964 1892 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:33:58.935313 kubelet[1892]: I0412 18:33:58.935001 1892 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:33:59.014778 kubelet[1892]: I0412 18:33:59.014753 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5llkk" podStartSLOduration=28.859446932 podCreationTimestamp="2024-04-12 18:33:25 +0000 UTC" firstStartedPulling="2024-04-12 18:33:53.24031998 +0000 UTC m=+30.367842816" lastFinishedPulling="2024-04-12 18:33:58.395581101 +0000 UTC m=+35.523103937" observedRunningTime="2024-04-12 18:33:59.013101268 +0000 UTC m=+36.140624064" watchObservedRunningTime="2024-04-12 18:33:59.014708053 +0000 UTC m=+36.142230889" Apr 12 18:33:59.875727 kubelet[1892]: E0412 18:33:59.875694 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:00.876237 kubelet[1892]: E0412 18:34:00.876181 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:01.046000 audit[3090]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.046000 audit[3090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeced3a40 a2=0 a3=1 items=0 ppid=2035 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.047000 audit[3090]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.047000 audit[3090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeced3a40 a2=0 a3=1 items=0 ppid=2035 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.058000 audit[3094]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.058000 audit[3094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe90f67c0 a2=0 a3=1 items=0 ppid=2035 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.058000 audit[3094]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.058000 audit[3094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe90f67c0 a2=0 a3=1 items=0 ppid=2035 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.065572 kubelet[1892]: I0412 18:34:01.065529 1892 topology_manager.go:215] "Topology Admit Handler" podUID="dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 18:34:01.069833 systemd[1]: Created slice kubepods-besteffort-poddcbe36bc_4c59_4e40_b6e7_4256e4ec72d8.slice. Apr 12 18:34:01.249795 kubelet[1892]: I0412 18:34:01.249766 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l7skw\" (UniqueName: \"kubernetes.io/projected/dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8-kube-api-access-l7skw\") pod \"nfs-server-provisioner-0\" (UID: \"dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8\") " pod="default/nfs-server-provisioner-0" Apr 12 18:34:01.250019 kubelet[1892]: I0412 18:34:01.250008 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8-data\") pod \"nfs-server-provisioner-0\" (UID: \"dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8\") " pod="default/nfs-server-provisioner-0" Apr 12 18:34:01.373852 env[1311]: time="2024-04-12T18:34:01.373784952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8,Namespace:default,Attempt:0,}" Apr 12 18:34:01.508677 systemd-networkd[1461]: cali60e51b789ff: Link UP Apr 12 18:34:01.520146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:01.520232 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:34:01.522239 systemd-networkd[1461]: cali60e51b789ff: Gained carrier Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.445 [INFO][3096] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8 1297 0 2024-04-12 18:34:01 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.39 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.445 [INFO][3096] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.469 [INFO][3108] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" HandleID="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.481 [INFO][3108] ipam_plugin.go 268: Auto assigning IP ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" HandleID="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029ab80), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:34:01.46966029 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.481 [INFO][3108] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.481 [INFO][3108] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.481 [INFO][3108] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.483 [INFO][3108] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.487 [INFO][3108] ipam.go 372: Looking up existing affinities for host host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.491 [INFO][3108] ipam.go 489: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.493 [INFO][3108] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.495 [INFO][3108] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.495 [INFO][3108] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.497 [INFO][3108] ipam.go 1682: Creating new handle: k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.500 [INFO][3108] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.505 [INFO][3108] ipam.go 1216: Successfully claimed IPs: [192.168.99.3/26] block=192.168.99.0/26 handle="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.505 [INFO][3108] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.3/26] handle="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" host="10.200.20.39" Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.505 [INFO][3108] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:01.531230 env[1311]: 2024-04-12 18:34:01.505 [INFO][3108] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.3/26] IPv6=[] ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" HandleID="k8s-pod-network.615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531767 env[1311]: 2024-04-12 18:34:01.506 [INFO][3096] k8s.go 385: Populated endpoint ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:01.531767 env[1311]: 2024-04-12 18:34:01.506 [INFO][3096] k8s.go 386: Calico CNI using IPs: [192.168.99.3/32] ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531767 env[1311]: 2024-04-12 18:34:01.506 [INFO][3096] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531767 env[1311]: 2024-04-12 18:34:01.521 [INFO][3096] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.531906 env[1311]: 2024-04-12 18:34:01.523 [INFO][3096] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:00:7c:f1:c0:11", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:01.531906 env[1311]: 2024-04-12 18:34:01.530 [INFO][3096] k8s.go 498: Wrote updated endpoint to datastore ContainerID="615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:34:01.548000 audit[3130]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:01.548000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffd7f7b080 a2=0 a3=ffffbe50ffa8 items=0 ppid=2555 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.548000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:01.552022 env[1311]: time="2024-04-12T18:34:01.551902034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:01.552022 env[1311]: time="2024-04-12T18:34:01.551939353Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:01.552022 env[1311]: time="2024-04-12T18:34:01.551949833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:01.552161 env[1311]: time="2024-04-12T18:34:01.552073829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e pid=3139 runtime=io.containerd.runc.v2 Apr 12 18:34:01.568831 systemd[1]: Started cri-containerd-615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e.scope. Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.579000 audit: BPF prog-id=110 op=LOAD Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631356435356137313965366531633934373735383663386262323136 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631356435356137313965366531633934373735383663386262323136 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit: BPF prog-id=111 op=LOAD Apr 12 18:34:01.580000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631356435356137313965366531633934373735383663386262323136 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit: BPF prog-id=112 op=LOAD Apr 12 18:34:01.580000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631356435356137313965366531633934373735383663386262323136 Apr 12 18:34:01.580000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:34:01.580000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.580000 audit: BPF prog-id=113 op=LOAD Apr 12 18:34:01.580000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631356435356137313965366531633934373735383663386262323136 Apr 12 18:34:01.600872 env[1311]: time="2024-04-12T18:34:01.600826711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dcbe36bc-4c59-4e40-b6e7-4256e4ec72d8,Namespace:default,Attempt:0,} returns sandbox id \"615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e\"" Apr 12 18:34:01.602677 env[1311]: time="2024-04-12T18:34:01.602653091Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:34:01.876639 kubelet[1892]: E0412 18:34:01.876515 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:02.362313 systemd[1]: run-containerd-runc-k8s.io-615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e-runc.JFdYhn.mount: Deactivated successfully. Apr 12 18:34:02.877476 kubelet[1892]: E0412 18:34:02.877433 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:03.408700 systemd-networkd[1461]: cali60e51b789ff: Gained IPv6LL Apr 12 18:34:03.850618 kubelet[1892]: E0412 18:34:03.850581 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:03.877985 kubelet[1892]: E0412 18:34:03.877949 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:04.190109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2013697857.mount: Deactivated successfully. Apr 12 18:34:04.878926 kubelet[1892]: E0412 18:34:04.878880 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:04.888690 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.57U8Tq.mount: Deactivated successfully. Apr 12 18:34:05.879618 kubelet[1892]: E0412 18:34:05.879573 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:06.316234 env[1311]: time="2024-04-12T18:34:06.316187028Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:06.324443 env[1311]: time="2024-04-12T18:34:06.324397182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:06.331913 env[1311]: time="2024-04-12T18:34:06.331880597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:06.336998 env[1311]: time="2024-04-12T18:34:06.336971925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:06.337938 env[1311]: time="2024-04-12T18:34:06.337910817Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 18:34:06.340371 env[1311]: time="2024-04-12T18:34:06.340336224Z" level=info msg="CreateContainer within sandbox \"615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:34:06.369590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1598196204.mount: Deactivated successfully. Apr 12 18:34:06.384401 env[1311]: time="2024-04-12T18:34:06.384351703Z" level=info msg="CreateContainer within sandbox \"615d55a719e6e1c9477586c8bb21697a37a5866d151639b1374d02f370023d0e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b0cd9390d890faa1c78cb24ffdbf5f0e2c2da0877365f08fb828e8ea8801de9c\"" Apr 12 18:34:06.385099 env[1311]: time="2024-04-12T18:34:06.385075081Z" level=info msg="StartContainer for \"b0cd9390d890faa1c78cb24ffdbf5f0e2c2da0877365f08fb828e8ea8801de9c\"" Apr 12 18:34:06.402295 systemd[1]: Started cri-containerd-b0cd9390d890faa1c78cb24ffdbf5f0e2c2da0877365f08fb828e8ea8801de9c.scope. Apr 12 18:34:06.423587 kernel: kauditd_printk_skb: 105 callbacks suppressed Apr 12 18:34:06.423692 kernel: audit: type=1400 audit(1712946846.416:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473924 kernel: audit: type=1400 audit(1712946846.416:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.474006 kernel: audit: type=1400 audit(1712946846.416:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.491350 kernel: audit: type=1400 audit(1712946846.416:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.491437 kernel: audit: type=1400 audit(1712946846.416:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.525100 kernel: audit: type=1400 audit(1712946846.416:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.542467 kernel: audit: type=1400 audit(1712946846.416:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.565136 kernel: audit: type=1400 audit(1712946846.416:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.565242 kernel: audit: type=1400 audit(1712946846.416:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.597723 kernel: audit: type=1400 audit(1712946846.422:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.422000 audit: BPF prog-id=114 op=LOAD Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3139 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230636439333930643839306661613163373863623234666664626635 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3139 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230636439333930643839306661613163373863623234666664626635 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.439000 audit: BPF prog-id=115 op=LOAD Apr 12 18:34:06.439000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3139 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230636439333930643839306661613163373863623234666664626635 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.455000 audit: BPF prog-id=116 op=LOAD Apr 12 18:34:06.455000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3139 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230636439333930643839306661613163373863623234666664626635 Apr 12 18:34:06.473000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:34:06.473000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:06.473000 audit: BPF prog-id=117 op=LOAD Apr 12 18:34:06.473000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3139 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230636439333930643839306661613163373863623234666664626635 Apr 12 18:34:06.608773 env[1311]: time="2024-04-12T18:34:06.608731890Z" level=info msg="StartContainer for \"b0cd9390d890faa1c78cb24ffdbf5f0e2c2da0877365f08fb828e8ea8801de9c\" returns successfully" Apr 12 18:34:06.646000 audit[3242]: AVC avc: denied { search } for pid=3242 comm="rpcbind" name="crypto" dev="proc" ino=20283 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:34:06.646000 audit[3242]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb26af000 a2=0 a3=0 items=0 ppid=3221 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 key=(null) Apr 12 18:34:06.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:34:06.686000 audit[3247]: AVC avc: denied { search } for pid=3247 comm="dbus-daemon" name="crypto" dev="proc" ino=20283 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:34:06.686000 audit[3247]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa71ff000 a2=0 a3=0 items=0 ppid=3221 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 key=(null) Apr 12 18:34:06.686000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:34:06.690000 audit[3248]: AVC avc: denied { watch } for pid=3248 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c693,c868 tclass=dir permissive=0 Apr 12 18:34:06.690000 audit[3248]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaad606aaf0 a2=2c8 a3=aaaad604ba60 items=0 ppid=3221 pid=3248 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 key=(null) Apr 12 18:34:06.690000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:34:06.695000 audit[3249]: AVC avc: denied { read } for pid=3249 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20308 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:34:06.695000 audit[3249]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa3f1a570 a2=80000 a3=0 items=0 ppid=3221 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 key=(null) Apr 12 18:34:06.695000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:34:06.696000 audit[3249]: AVC avc: denied { search } for pid=3249 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20283 scontext=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:34:06.696000 audit[3249]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa32af000 a2=0 a3=0 items=0 ppid=3221 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c693,c868 key=(null) Apr 12 18:34:06.696000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:34:06.882101 kubelet[1892]: E0412 18:34:06.880327 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:07.027735 kubelet[1892]: I0412 18:34:07.027692 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.290891813 podCreationTimestamp="2024-04-12 18:34:01 +0000 UTC" firstStartedPulling="2024-04-12 18:34:01.602152947 +0000 UTC m=+38.729675783" lastFinishedPulling="2024-04-12 18:34:06.338916746 +0000 UTC m=+43.466439542" observedRunningTime="2024-04-12 18:34:07.027508816 +0000 UTC m=+44.155031652" watchObservedRunningTime="2024-04-12 18:34:07.027655572 +0000 UTC m=+44.155178408" Apr 12 18:34:07.039000 audit[3254]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.039000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffda05e140 a2=0 a3=1 items=0 ppid=2035 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:07.041000 audit[3254]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.041000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffda05e140 a2=0 a3=1 items=0 ppid=2035 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:07.881337 kubelet[1892]: E0412 18:34:07.881288 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:08.882335 kubelet[1892]: E0412 18:34:08.882302 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:09.883498 kubelet[1892]: E0412 18:34:09.883450 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:10.883797 kubelet[1892]: E0412 18:34:10.883757 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:11.884306 kubelet[1892]: E0412 18:34:11.884273 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:12.884979 kubelet[1892]: E0412 18:34:12.884942 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:13.885924 kubelet[1892]: E0412 18:34:13.885892 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:14.886433 kubelet[1892]: E0412 18:34:14.886400 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:15.886944 kubelet[1892]: E0412 18:34:15.886911 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:16.887780 kubelet[1892]: E0412 18:34:16.887745 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:17.888644 kubelet[1892]: E0412 18:34:17.888603 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:18.889251 kubelet[1892]: E0412 18:34:18.889220 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:19.890451 kubelet[1892]: E0412 18:34:19.890414 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:20.891495 kubelet[1892]: E0412 18:34:20.891457 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:21.892383 kubelet[1892]: E0412 18:34:21.892353 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:22.893394 kubelet[1892]: E0412 18:34:22.893355 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:23.850533 kubelet[1892]: E0412 18:34:23.850486 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:23.860270 env[1311]: time="2024-04-12T18:34:23.860234282Z" level=info msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" Apr 12 18:34:23.894321 kubelet[1892]: E0412 18:34:23.894287 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.895 [WARNING][3297] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--5llkk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f49eee-6bc5-4b84-8eaf-447c55705651", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73", Pod:"csi-node-driver-5llkk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic9a6bd9ac41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.895 [INFO][3297] k8s.go 585: Cleaning up netns ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.895 [INFO][3297] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" iface="eth0" netns="" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.895 [INFO][3297] k8s.go 592: Releasing IP address(es) ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.895 [INFO][3297] utils.go 188: Calico CNI releasing IP address ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.911 [INFO][3303] ipam_plugin.go 415: Releasing address using handleID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.911 [INFO][3303] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.911 [INFO][3303] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.920 [WARNING][3303] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.920 [INFO][3303] ipam_plugin.go 443: Releasing address using workloadID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.922 [INFO][3303] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:23.925330 env[1311]: 2024-04-12 18:34:23.924 [INFO][3297] k8s.go 598: Teardown processing complete. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.925858 env[1311]: time="2024-04-12T18:34:23.925816434Z" level=info msg="TearDown network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" successfully" Apr 12 18:34:23.925932 env[1311]: time="2024-04-12T18:34:23.925916512Z" level=info msg="StopPodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" returns successfully" Apr 12 18:34:23.926475 env[1311]: time="2024-04-12T18:34:23.926451379Z" level=info msg="RemovePodSandbox for \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" Apr 12 18:34:23.926732 env[1311]: time="2024-04-12T18:34:23.926684334Z" level=info msg="Forcibly stopping sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\"" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.961 [WARNING][3322] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--5llkk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f49eee-6bc5-4b84-8eaf-447c55705651", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"d01d5399b03a56541adcd38efc56e1a65a92ba58c79421e6ae000ee2854a1f73", Pod:"csi-node-driver-5llkk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic9a6bd9ac41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.962 [INFO][3322] k8s.go 585: Cleaning up netns ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.962 [INFO][3322] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" iface="eth0" netns="" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.962 [INFO][3322] k8s.go 592: Releasing IP address(es) ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.962 [INFO][3322] utils.go 188: Calico CNI releasing IP address ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.978 [INFO][3330] ipam_plugin.go 415: Releasing address using handleID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.978 [INFO][3330] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.978 [INFO][3330] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.992 [WARNING][3330] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.992 [INFO][3330] ipam_plugin.go 443: Releasing address using workloadID ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" HandleID="k8s-pod-network.243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Workload="10.200.20.39-k8s-csi--node--driver--5llkk-eth0" Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.994 [INFO][3330] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:23.996018 env[1311]: 2024-04-12 18:34:23.995 [INFO][3322] k8s.go 598: Teardown processing complete. ContainerID="243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda" Apr 12 18:34:23.996497 env[1311]: time="2024-04-12T18:34:23.996468947Z" level=info msg="TearDown network for sandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" successfully" Apr 12 18:34:24.004596 env[1311]: time="2024-04-12T18:34:24.004557880Z" level=info msg="RemovePodSandbox \"243e553afbecff5add93104fb1d95973d87acfab756dbb8fc63c2de538904bda\" returns successfully" Apr 12 18:34:24.005151 env[1311]: time="2024-04-12T18:34:24.005128067Z" level=info msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.036 [WARNING][3349] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"633af25e-89c3-49f2-8639-e802dfc98ca4", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39", Pod:"nginx-deployment-6d5f899847-jhq7q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4d77f2dc7b4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.036 [INFO][3349] k8s.go 585: Cleaning up netns ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.036 [INFO][3349] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" iface="eth0" netns="" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.036 [INFO][3349] k8s.go 592: Releasing IP address(es) ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.036 [INFO][3349] utils.go 188: Calico CNI releasing IP address ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.054 [INFO][3355] ipam_plugin.go 415: Releasing address using handleID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.054 [INFO][3355] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.055 [INFO][3355] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.064 [WARNING][3355] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.064 [INFO][3355] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.065 [INFO][3355] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:24.067687 env[1311]: 2024-04-12 18:34:24.066 [INFO][3349] k8s.go 598: Teardown processing complete. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.068256 env[1311]: time="2024-04-12T18:34:24.068212215Z" level=info msg="TearDown network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" successfully" Apr 12 18:34:24.068329 env[1311]: time="2024-04-12T18:34:24.068313613Z" level=info msg="StopPodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" returns successfully" Apr 12 18:34:24.068844 env[1311]: time="2024-04-12T18:34:24.068812762Z" level=info msg="RemovePodSandbox for \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" Apr 12 18:34:24.069085 env[1311]: time="2024-04-12T18:34:24.069038676Z" level=info msg="Forcibly stopping sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\"" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.100 [WARNING][3373] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"633af25e-89c3-49f2-8639-e802dfc98ca4", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"4b7b6e9c95079468c1be438bc107621b32d7b7f4c39124fa207ffa0752454f39", Pod:"nginx-deployment-6d5f899847-jhq7q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4d77f2dc7b4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.101 [INFO][3373] k8s.go 585: Cleaning up netns ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.101 [INFO][3373] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" iface="eth0" netns="" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.101 [INFO][3373] k8s.go 592: Releasing IP address(es) ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.101 [INFO][3373] utils.go 188: Calico CNI releasing IP address ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.118 [INFO][3379] ipam_plugin.go 415: Releasing address using handleID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.118 [INFO][3379] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.118 [INFO][3379] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.128 [WARNING][3379] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.128 [INFO][3379] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" HandleID="k8s-pod-network.5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Workload="10.200.20.39-k8s-nginx--deployment--6d5f899847--jhq7q-eth0" Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.132 [INFO][3379] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:24.136329 env[1311]: 2024-04-12 18:34:24.133 [INFO][3373] k8s.go 598: Teardown processing complete. ContainerID="5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472" Apr 12 18:34:24.136840 env[1311]: time="2024-04-12T18:34:24.136798077Z" level=info msg="TearDown network for sandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" successfully" Apr 12 18:34:24.144370 env[1311]: time="2024-04-12T18:34:24.144339824Z" level=info msg="RemovePodSandbox \"5d7c67bd5b2922f462cf480daf55741f2c30b9ae9ebd7788f45e68e8b8a0c472\" returns successfully" Apr 12 18:34:24.894568 kubelet[1892]: E0412 18:34:24.894511 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:25.895297 kubelet[1892]: E0412 18:34:25.895261 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:26.896402 kubelet[1892]: E0412 18:34:26.896372 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:27.896989 kubelet[1892]: E0412 18:34:27.896931 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:28.897620 kubelet[1892]: E0412 18:34:28.897587 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:29.898356 kubelet[1892]: E0412 18:34:29.898300 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:30.899371 kubelet[1892]: E0412 18:34:30.899338 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:31.900087 kubelet[1892]: E0412 18:34:31.900053 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:32.106900 kubelet[1892]: I0412 18:34:32.106863 1892 topology_manager.go:215] "Topology Admit Handler" podUID="53f47e49-2050-487e-b0f4-8bad26904049" podNamespace="default" podName="test-pod-1" Apr 12 18:34:32.110893 systemd[1]: Created slice kubepods-besteffort-pod53f47e49_2050_487e_b0f4_8bad26904049.slice. Apr 12 18:34:32.304192 kubelet[1892]: I0412 18:34:32.304158 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xfsqv\" (UniqueName: \"kubernetes.io/projected/53f47e49-2050-487e-b0f4-8bad26904049-kube-api-access-xfsqv\") pod \"test-pod-1\" (UID: \"53f47e49-2050-487e-b0f4-8bad26904049\") " pod="default/test-pod-1" Apr 12 18:34:32.304405 kubelet[1892]: I0412 18:34:32.304393 1892 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7f403460-522e-4d0b-bab2-5f48911b8da6\" (UniqueName: \"kubernetes.io/nfs/53f47e49-2050-487e-b0f4-8bad26904049-pvc-7f403460-522e-4d0b-bab2-5f48911b8da6\") pod \"test-pod-1\" (UID: \"53f47e49-2050-487e-b0f4-8bad26904049\") " pod="default/test-pod-1" Apr 12 18:34:32.698000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.705913 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:34:32.705973 kernel: audit: type=1400 audit(1712946872.698:782): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.729424 kernel: Failed to create system directory netfs Apr 12 18:34:32.698000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.757496 kernel: Failed to create system directory netfs Apr 12 18:34:32.757652 kernel: audit: type=1400 audit(1712946872.698:782): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.757688 kernel: Failed to create system directory netfs Apr 12 18:34:32.757703 kernel: audit: type=1400 audit(1712946872.698:782): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.698000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.780725 kernel: Failed to create system directory netfs Apr 12 18:34:32.780789 kernel: audit: type=1400 audit(1712946872.698:782): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.698000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:32.698000 audit[3401]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae6ff35e0 a1=12c14 a2=aaaadbfce028 a3=aaaae6fe4010 items=0 ppid=1009 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.827261 kernel: audit: type=1300 audit(1712946872.698:782): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae6ff35e0 a1=12c14 a2=aaaadbfce028 a3=aaaae6fe4010 items=0 ppid=1009 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.698000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:34:32.836099 kernel: audit: type=1327 audit(1712946872.698:782): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:34:32.901023 kubelet[1892]: E0412 18:34:32.900981 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.399725 kernel: Failed to create system directory fscache Apr 12 18:34:33.399834 kernel: audit: type=1400 audit(1712946873.366:783): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.399869 kernel: Failed to create system directory fscache Apr 12 18:34:33.399891 kernel: audit: type=1400 audit(1712946873.366:783): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.424620 kernel: Failed to create system directory fscache Apr 12 18:34:33.424714 kernel: audit: type=1400 audit(1712946873.366:783): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.448120 kernel: Failed to create system directory fscache Apr 12 18:34:33.448231 kernel: audit: type=1400 audit(1712946873.366:783): avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.471835 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.476573 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.481305 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.485886 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.490444 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.495102 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.499579 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.504263 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.508760 kernel: Failed to create system directory fscache Apr 12 18:34:33.508851 kernel: Failed to create system directory fscache Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.366000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.516697 kernel: FS-Cache: Loaded Apr 12 18:34:33.366000 audit[3401]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae7206210 a1=4c344 a2=aaaadbfce028 a3=aaaae6fe4010 items=0 ppid=1009 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.366000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.621969 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.622040 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.626402 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.635252 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.635315 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.639598 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.643959 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.648247 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.652566 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.652672 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.661180 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.661293 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.669365 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.673713 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.673766 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.681903 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.681941 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.689844 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.689895 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.697826 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.701933 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.706078 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.706116 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.713903 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.713955 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.721444 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.725705 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.725752 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.733174 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.736930 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.736972 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.744529 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.744611 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.751928 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.751987 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.759381 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.759418 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.766894 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.766954 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.774918 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.774978 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.782012 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.782040 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.789588 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.789639 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.797040 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.797104 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.804434 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.804483 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.811769 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.811804 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.819431 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.819490 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.826801 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.830835 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.830883 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.838434 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.838501 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.845830 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.849627 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.849685 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.856947 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.860638 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.860692 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.867902 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.867941 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.875118 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.875174 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.882774 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.882832 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.890023 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.890061 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.897317 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.897367 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.901622 kubelet[1892]: E0412 18:34:33.901600 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:33.904559 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.904630 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.911719 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.911772 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.919125 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.922867 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.922909 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.930140 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.934227 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.934286 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.941670 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.941754 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.945582 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.952867 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.956711 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.956766 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.964289 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.964380 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.971717 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.971771 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.975537 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.982800 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.986865 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.986899 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.994210 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.994287 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.002713 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.007379 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.007480 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.014798 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.014878 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.022277 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.022351 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.029547 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.029592 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.036803 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.041130 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.041194 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.048377 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.048442 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.056122 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.056176 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.063658 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.063732 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.071728 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.071798 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.075603 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.083198 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.083267 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.090621 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.094802 kernel: Failed to create system directory sunrpc Apr 12 18:34:34.094859 kernel: Failed to create system directory sunrpc Apr 12 18:34:33.607000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.110949 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:34:34.111026 kernel: RPC: Registered udp transport module. Apr 12 18:34:34.111046 kernel: RPC: Registered tcp transport module. Apr 12 18:34:34.114420 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:34:33.607000 audit[3401]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae7252560 a1=14a344 a2=aaaadbfce028 a3=aaaae6fe4010 items=6 ppid=1009 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.607000 audit: CWD cwd="/" Apr 12 18:34:33.607000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PATH item=1 name=(null) inode=21692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PATH item=2 name=(null) inode=21692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PATH item=3 name=(null) inode=21693 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PATH item=4 name=(null) inode=21692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PATH item=5 name=(null) inode=21694 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:33.607000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.720592 kernel: Failed to create system directory nfs Apr 12 18:34:34.720712 kernel: Failed to create system directory nfs Apr 12 18:34:34.720811 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.727689 kernel: Failed to create system directory nfs Apr 12 18:34:34.727903 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.734950 kernel: Failed to create system directory nfs Apr 12 18:34:34.735032 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.741874 kernel: Failed to create system directory nfs Apr 12 18:34:34.741960 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.745392 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.752418 kernel: Failed to create system directory nfs Apr 12 18:34:34.752528 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.756017 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.762735 kernel: Failed to create system directory nfs Apr 12 18:34:34.762801 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.769942 kernel: Failed to create system directory nfs Apr 12 18:34:34.769993 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.776745 kernel: Failed to create system directory nfs Apr 12 18:34:34.776882 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.783690 kernel: Failed to create system directory nfs Apr 12 18:34:34.783765 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.790588 kernel: Failed to create system directory nfs Apr 12 18:34:34.790629 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.797477 kernel: Failed to create system directory nfs Apr 12 18:34:34.797532 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.804310 kernel: Failed to create system directory nfs Apr 12 18:34:34.804401 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.811254 kernel: Failed to create system directory nfs Apr 12 18:34:34.811315 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.818078 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.821831 kernel: Failed to create system directory nfs Apr 12 18:34:34.821893 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.828825 kernel: Failed to create system directory nfs Apr 12 18:34:34.828865 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.835665 kernel: Failed to create system directory nfs Apr 12 18:34:34.835745 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.842568 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.846274 kernel: Failed to create system directory nfs Apr 12 18:34:34.846368 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.854009 kernel: Failed to create system directory nfs Apr 12 18:34:34.858256 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.otBAr2.mount: Deactivated successfully. Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.862264 kernel: Failed to create system directory nfs Apr 12 18:34:34.862350 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.869186 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.873331 kernel: Failed to create system directory nfs Apr 12 18:34:34.873455 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.880414 kernel: Failed to create system directory nfs Apr 12 18:34:34.880508 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.887425 kernel: Failed to create system directory nfs Apr 12 18:34:34.887502 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.894442 kernel: Failed to create system directory nfs Apr 12 18:34:34.894508 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.901231 kernel: Failed to create system directory nfs Apr 12 18:34:34.901310 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.902572 kubelet[1892]: E0412 18:34:34.902522 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.908151 kernel: Failed to create system directory nfs Apr 12 18:34:34.908205 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.915194 kernel: Failed to create system directory nfs Apr 12 18:34:34.915277 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.922309 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:34.926650 kernel: Failed to create system directory nfs Apr 12 18:34:34.708000 audit[3401]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae73fb4f0 a1=115814 a2=aaaadbfce028 a3=aaaae6fe4010 items=0 ppid=1009 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:34.708000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:34:34.944581 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.895324 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.895392 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.898935 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.902672 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.902751 kubelet[1892]: E0412 18:34:35.902707 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.906571 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.910057 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.913565 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.917226 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.920756 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.924285 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.927880 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.931571 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.935073 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.938589 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.942130 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.949633 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.949667 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.953210 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.956829 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.960322 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.964041 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.967598 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.971102 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.974610 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.978199 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.981754 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.985535 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.989304 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.992892 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.996559 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.000406 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.003959 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.007541 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.011251 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.014855 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.018433 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.021992 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.025489 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.032644 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.032687 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.036212 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.039731 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.043254 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.046964 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.050655 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.054545 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.058214 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.061954 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.065519 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.069033 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.072514 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.076111 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.079660 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.083194 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.086906 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.090464 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.097491 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.097531 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.101045 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.104541 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.109177 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.112748 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.116228 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.119779 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.123393 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.126946 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.130460 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.137580 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.137621 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.141205 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.146212 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.146278 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.153451 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.153581 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.160770 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.164396 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.168026 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.168082 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.175404 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.175451 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.182506 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.182586 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.186087 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.193140 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.196726 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.196771 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.203806 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.203833 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.207322 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.214360 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.218659 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.218703 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.225683 kernel: Failed to create system directory nfs4 Apr 12 18:34:36.225710 kernel: Failed to create system directory nfs4 Apr 12 18:34:35.881000 audit[3428]: AVC avc: denied { confidentiality } for pid=3428 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.335977 kernel: NFS: Registering the id_resolver key type Apr 12 18:34:36.336103 kernel: Key type id_resolver registered Apr 12 18:34:36.336123 kernel: Key type id_legacy registered Apr 12 18:34:35.881000 audit[3428]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8b56b010 a1=19c244 a2=aaaac1cae028 a3=aaaaf827c010 items=0 ppid=1009 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.881000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.393624 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.393690 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.397585 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.401402 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.405194 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.409077 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.413006 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.416870 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.420733 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.424617 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.428425 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.432260 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.436057 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.439930 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.444099 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.447929 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.451727 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.455547 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.459296 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.463171 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.467097 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.471207 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.471255 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.478784 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.478814 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.482560 kernel: Failed to create system directory rpcgss Apr 12 18:34:36.383000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:34:36.383000 audit[3429]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff951f3010 a1=5ef34 a2=aaaad776e028 a3=aaaaf79b2010 items=0 ppid=1009 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.383000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:34:36.903540 kubelet[1892]: E0412 18:34:36.903494 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:37.173068 nfsidmap[3435]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-55c15aa841' Apr 12 18:34:37.528400 nfsidmap[3436]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-55c15aa841' Apr 12 18:34:37.540000 audit[1417]: AVC avc: denied { watch_reads } for pid=1417 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.540000 audit[1417]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a6d3480 a2=10 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:37.540000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:34:37.540000 audit[1417]: AVC avc: denied { watch_reads } for pid=1417 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.540000 audit[1417]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a6d3480 a2=10 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:37.540000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:34:37.540000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.540000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.540000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.541000 audit[1417]: AVC avc: denied { watch_reads } for pid=1417 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:34:37.541000 audit[1417]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a6d3480 a2=10 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:37.541000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:34:37.814854 env[1311]: time="2024-04-12T18:34:37.814743844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:53f47e49-2050-487e-b0f4-8bad26904049,Namespace:default,Attempt:0,}" Apr 12 18:34:37.903663 kubelet[1892]: E0412 18:34:37.903606 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:37.968619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:37.968951 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:34:37.958522 systemd-networkd[1461]: cali5ec59c6bf6e: Link UP Apr 12 18:34:37.968963 systemd-networkd[1461]: cali5ec59c6bf6e: Gained carrier Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.880 [INFO][3442] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-test--pod--1-eth0 default 53f47e49-2050-487e-b0f4-8bad26904049 1398 0 2024-04-12 18:34:02 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.39 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.880 [INFO][3442] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.908 [INFO][3454] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" HandleID="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Workload="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.933 [INFO][3454] ipam_plugin.go 268: Auto assigning IP ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" HandleID="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Workload="10.200.20.39-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000265820), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"test-pod-1", "timestamp":"2024-04-12 18:34:37.908875806 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.933 [INFO][3454] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.933 [INFO][3454] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.933 [INFO][3454] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.935 [INFO][3454] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.938 [INFO][3454] ipam.go 372: Looking up existing affinities for host host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.942 [INFO][3454] ipam.go 489: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.943 [INFO][3454] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.945 [INFO][3454] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.945 [INFO][3454] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.947 [INFO][3454] ipam.go 1682: Creating new handle: k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1 Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.950 [INFO][3454] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.955 [INFO][3454] ipam.go 1216: Successfully claimed IPs: [192.168.99.4/26] block=192.168.99.0/26 handle="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.955 [INFO][3454] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.4/26] handle="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" host="10.200.20.39" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.955 [INFO][3454] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.955 [INFO][3454] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.4/26] IPv6=[] ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" HandleID="k8s-pod-network.e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Workload="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.956 [INFO][3442] k8s.go 385: Populated endpoint ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"53f47e49-2050-487e-b0f4-8bad26904049", ResourceVersion:"1398", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:38.010430 env[1311]: 2024-04-12 18:34:37.956 [INFO][3442] k8s.go 386: Calico CNI using IPs: [192.168.99.4/32] ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.011187 env[1311]: 2024-04-12 18:34:37.956 [INFO][3442] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.011187 env[1311]: 2024-04-12 18:34:37.969 [INFO][3442] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.011187 env[1311]: 2024-04-12 18:34:37.970 [INFO][3442] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"53f47e49-2050-487e-b0f4-8bad26904049", ResourceVersion:"1398", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"fa:59:29:8f:75:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:38.011187 env[1311]: 2024-04-12 18:34:38.009 [INFO][3442] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Apr 12 18:34:38.025226 env[1311]: time="2024-04-12T18:34:38.025162052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:38.025343 env[1311]: time="2024-04-12T18:34:38.025232571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:38.025343 env[1311]: time="2024-04-12T18:34:38.025258770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:38.025530 env[1311]: time="2024-04-12T18:34:38.025474126Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1 pid=3478 runtime=io.containerd.runc.v2 Apr 12 18:34:38.046000 audit[3500]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:38.052485 kernel: kauditd_printk_skb: 344 callbacks suppressed Apr 12 18:34:38.052604 kernel: audit: type=1325 audit(1712946878.046:794): table=filter:81 family=2 entries=38 op=nft_register_chain pid=3500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:38.060629 systemd[1]: Started cri-containerd-e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1.scope. Apr 12 18:34:38.046000 audit[3500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=fffffb3103c0 a2=0 a3=ffffaa50efa8 items=0 ppid=2555 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.092885 kernel: audit: type=1300 audit(1712946878.046:794): arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=fffffb3103c0 a2=0 a3=ffffaa50efa8 items=0 ppid=2555 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:38.112676 kernel: audit: type=1327 audit(1712946878.046:794): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.129634 kernel: audit: type=1400 audit(1712946878.098:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.129714 kernel: audit: type=1400 audit(1712946878.098:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.160159 kernel: audit: type=1400 audit(1712946878.098:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.160239 kernel: audit: type=1400 audit(1712946878.098:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.192143 kernel: audit: type=1400 audit(1712946878.098:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.208319 kernel: audit: type=1400 audit(1712946878.098:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.208408 kernel: audit: type=1400 audit(1712946878.098:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit: BPF prog-id=118 op=LOAD Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386466343535363464366364323030396134613630313638343933 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386466343535363464366364323030396134613630313638343933 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit: BPF prog-id=119 op=LOAD Apr 12 18:34:38.111000 audit[3488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386466343535363464366364323030396134613630313638343933 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.111000 audit: BPF prog-id=120 op=LOAD Apr 12 18:34:38.111000 audit[3488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386466343535363464366364323030396134613630313638343933 Apr 12 18:34:38.111000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:34:38.112000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.112000 audit: BPF prog-id=121 op=LOAD Apr 12 18:34:38.112000 audit[3488]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386466343535363464366364323030396134613630313638343933 Apr 12 18:34:38.244088 env[1311]: time="2024-04-12T18:34:38.244047088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:53f47e49-2050-487e-b0f4-8bad26904049,Namespace:default,Attempt:0,} returns sandbox id \"e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1\"" Apr 12 18:34:38.245813 env[1311]: time="2024-04-12T18:34:38.245787134Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:34:38.610498 env[1311]: time="2024-04-12T18:34:38.610457810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.616913 env[1311]: time="2024-04-12T18:34:38.616884323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.623842 env[1311]: time="2024-04-12T18:34:38.623818026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.628016 env[1311]: time="2024-04-12T18:34:38.627990184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.628656 env[1311]: time="2024-04-12T18:34:38.628625851Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:34:38.631296 env[1311]: time="2024-04-12T18:34:38.631265199Z" level=info msg="CreateContainer within sandbox \"e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:34:38.651746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2387622843.mount: Deactivated successfully. Apr 12 18:34:38.656862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount497808395.mount: Deactivated successfully. Apr 12 18:34:38.674275 env[1311]: time="2024-04-12T18:34:38.674231230Z" level=info msg="CreateContainer within sandbox \"e48df45564d6cd2009a4a60168493a55c76d155989214520d78ff63ccd3588d1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"fc8a3da5255820491cb64682d556bc513d5b9dbfab4996cadad399e8bb3c9962\"" Apr 12 18:34:38.675011 env[1311]: time="2024-04-12T18:34:38.674979975Z" level=info msg="StartContainer for \"fc8a3da5255820491cb64682d556bc513d5b9dbfab4996cadad399e8bb3c9962\"" Apr 12 18:34:38.688859 systemd[1]: Started cri-containerd-fc8a3da5255820491cb64682d556bc513d5b9dbfab4996cadad399e8bb3c9962.scope. Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.698000 audit: BPF prog-id=122 op=LOAD Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3478 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663386133646135323535383230343931636236343638326435353662 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3478 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663386133646135323535383230343931636236343638326435353662 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit: BPF prog-id=123 op=LOAD Apr 12 18:34:38.699000 audit[3521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3478 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663386133646135323535383230343931636236343638326435353662 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit: BPF prog-id=124 op=LOAD Apr 12 18:34:38.699000 audit[3521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3478 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663386133646135323535383230343931636236343638326435353662 Apr 12 18:34:38.699000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:34:38.699000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.699000 audit: BPF prog-id=125 op=LOAD Apr 12 18:34:38.699000 audit[3521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3478 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663386133646135323535383230343931636236343638326435353662 Apr 12 18:34:38.717282 env[1311]: time="2024-04-12T18:34:38.717238861Z" level=info msg="StartContainer for \"fc8a3da5255820491cb64682d556bc513d5b9dbfab4996cadad399e8bb3c9962\" returns successfully" Apr 12 18:34:38.904272 kubelet[1892]: E0412 18:34:38.904126 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:39.086689 kubelet[1892]: I0412 18:34:39.086657 1892 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=36.703081115 podCreationTimestamp="2024-04-12 18:34:02 +0000 UTC" firstStartedPulling="2024-04-12 18:34:38.245368742 +0000 UTC m=+75.372891578" lastFinishedPulling="2024-04-12 18:34:38.628909925 +0000 UTC m=+75.756432761" observedRunningTime="2024-04-12 18:34:39.086541259 +0000 UTC m=+76.214064135" watchObservedRunningTime="2024-04-12 18:34:39.086622298 +0000 UTC m=+76.214145134" Apr 12 18:34:39.440825 systemd-networkd[1461]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:34:39.905009 kubelet[1892]: E0412 18:34:39.904896 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:40.905655 kubelet[1892]: E0412 18:34:40.905621 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:41.906346 kubelet[1892]: E0412 18:34:41.906313 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:42.906670 kubelet[1892]: E0412 18:34:42.906633 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:43.850758 kubelet[1892]: E0412 18:34:43.850724 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:43.907011 kubelet[1892]: E0412 18:34:43.906989 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:44.907390 kubelet[1892]: E0412 18:34:44.907353 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:45.908244 kubelet[1892]: E0412 18:34:45.908217 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:46.909186 kubelet[1892]: E0412 18:34:46.909158 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:47.910262 kubelet[1892]: E0412 18:34:47.910228 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:48.910377 kubelet[1892]: E0412 18:34:48.910339 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:49.911540 kubelet[1892]: E0412 18:34:49.911507 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:50.912225 kubelet[1892]: E0412 18:34:50.912194 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:51.913518 kubelet[1892]: E0412 18:34:51.913481 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:52.914277 kubelet[1892]: E0412 18:34:52.914249 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:53.915691 kubelet[1892]: E0412 18:34:53.915657 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:54.916076 kubelet[1892]: E0412 18:34:54.916046 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:55.917112 kubelet[1892]: E0412 18:34:55.916944 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:56.918013 kubelet[1892]: E0412 18:34:56.917986 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:57.919028 kubelet[1892]: E0412 18:34:57.918989 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:58.919937 kubelet[1892]: E0412 18:34:58.919911 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:34:59.921255 kubelet[1892]: E0412 18:34:59.921228 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:00.397528 kubelet[1892]: E0412 18:35:00.397492 1892 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:53962->10.200.20.14:2379: read: connection timed out" Apr 12 18:35:00.922249 kubelet[1892]: E0412 18:35:00.922218 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:01.922501 kubelet[1892]: E0412 18:35:01.922456 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:02.923442 kubelet[1892]: E0412 18:35:02.923413 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:03.850677 kubelet[1892]: E0412 18:35:03.850645 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:03.924107 kubelet[1892]: E0412 18:35:03.924076 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:04.854955 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.4EGLtP.mount: Deactivated successfully. Apr 12 18:35:04.924968 kubelet[1892]: E0412 18:35:04.924924 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:05.925928 kubelet[1892]: E0412 18:35:05.925895 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:06.926929 kubelet[1892]: E0412 18:35:06.926896 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:07.927330 kubelet[1892]: E0412 18:35:07.927300 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:08.927769 kubelet[1892]: E0412 18:35:08.927732 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:09.928407 kubelet[1892]: E0412 18:35:09.928365 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:10.398365 kubelet[1892]: E0412 18:35:10.398327 1892 controller.go:193] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io 10.200.20.39)" Apr 12 18:35:10.928655 kubelet[1892]: E0412 18:35:10.928621 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:11.928798 kubelet[1892]: E0412 18:35:11.928745 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:12.929748 kubelet[1892]: E0412 18:35:12.929720 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:13.930327 kubelet[1892]: E0412 18:35:13.930301 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:14.931289 kubelet[1892]: E0412 18:35:14.931249 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:15.932032 kubelet[1892]: E0412 18:35:15.931994 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:16.932426 kubelet[1892]: E0412 18:35:16.932398 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:17.933049 kubelet[1892]: E0412 18:35:17.933018 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:18.933706 kubelet[1892]: E0412 18:35:18.933679 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:19.935089 kubelet[1892]: E0412 18:35:19.935056 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:20.398801 kubelet[1892]: E0412 18:35:20.398762 1892 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:20.936005 kubelet[1892]: E0412 18:35:20.935978 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:21.937051 kubelet[1892]: E0412 18:35:21.937021 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:22.937806 kubelet[1892]: E0412 18:35:22.937778 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:23.850684 kubelet[1892]: E0412 18:35:23.850611 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:23.939027 kubelet[1892]: E0412 18:35:23.938996 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:24.939296 kubelet[1892]: E0412 18:35:24.939263 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:25.939687 kubelet[1892]: E0412 18:35:25.939647 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:26.940584 kubelet[1892]: E0412 18:35:26.940535 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:27.941685 kubelet[1892]: E0412 18:35:27.941659 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:28.942858 kubelet[1892]: E0412 18:35:28.942829 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:29.944051 kubelet[1892]: E0412 18:35:29.944026 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:30.400254 kubelet[1892]: E0412 18:35:30.399950 1892 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:30.945354 kubelet[1892]: E0412 18:35:30.945325 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:31.946484 kubelet[1892]: E0412 18:35:31.946457 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:32.947079 kubelet[1892]: E0412 18:35:32.947052 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:33.948050 kubelet[1892]: E0412 18:35:33.948025 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:34.855600 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.ZHsOfQ.mount: Deactivated successfully. Apr 12 18:35:34.949358 kubelet[1892]: E0412 18:35:34.949316 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:35.949677 kubelet[1892]: E0412 18:35:35.949652 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:36.950118 kubelet[1892]: E0412 18:35:36.950083 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:37.474831 kubelet[1892]: E0412 18:35:37.474799 1892 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.39?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:37.950764 kubelet[1892]: E0412 18:35:37.950743 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:38.951341 kubelet[1892]: E0412 18:35:38.951310 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:39.951907 kubelet[1892]: E0412 18:35:39.951872 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:40.401420 kubelet[1892]: E0412 18:35:40.401046 1892 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:40.401420 kubelet[1892]: I0412 18:35:40.401086 1892 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Apr 12 18:35:40.952229 kubelet[1892]: E0412 18:35:40.952197 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:41.953343 kubelet[1892]: E0412 18:35:41.953293 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:42.954458 kubelet[1892]: E0412 18:35:42.954426 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:43.850333 kubelet[1892]: E0412 18:35:43.850298 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:43.955623 kubelet[1892]: E0412 18:35:43.955599 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:44.956943 kubelet[1892]: E0412 18:35:44.956909 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:45.957704 kubelet[1892]: E0412 18:35:45.957671 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:46.957937 kubelet[1892]: E0412 18:35:46.957903 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:47.475315 kubelet[1892]: E0412 18:35:47.475284 1892 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:47.958805 kubelet[1892]: E0412 18:35:47.958783 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:48.959621 kubelet[1892]: E0412 18:35:48.959597 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:49.960269 kubelet[1892]: E0412 18:35:49.960243 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:50.401334 kubelet[1892]: E0412 18:35:50.401232 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": context deadline exceeded" interval="200ms" Apr 12 18:35:50.961395 kubelet[1892]: E0412 18:35:50.961360 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:51.962078 kubelet[1892]: E0412 18:35:51.962047 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:52.963113 kubelet[1892]: E0412 18:35:52.963079 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:53.963433 kubelet[1892]: E0412 18:35:53.963408 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:54.964064 kubelet[1892]: E0412 18:35:54.964028 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:55.964220 kubelet[1892]: E0412 18:35:55.964170 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:56.964430 kubelet[1892]: E0412 18:35:56.964396 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:57.476288 kubelet[1892]: E0412 18:35:57.476255 1892 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:57.965232 kubelet[1892]: E0412 18:35:57.965208 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:58.965849 kubelet[1892]: E0412 18:35:58.965825 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:35:59.966559 kubelet[1892]: E0412 18:35:59.966528 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:00.602465 kubelet[1892]: E0412 18:36:00.602432 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Apr 12 18:36:00.966871 kubelet[1892]: E0412 18:36:00.966845 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:01.967631 kubelet[1892]: E0412 18:36:01.967607 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:02.968685 kubelet[1892]: E0412 18:36:02.968656 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:03.850355 kubelet[1892]: E0412 18:36:03.850323 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:03.970228 kubelet[1892]: E0412 18:36:03.970199 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:04.854541 systemd[1]: run-containerd-runc-k8s.io-54e4e5bac91391e87b35ebe79503461db12ca1957ed719b438d3d0e4ce8b30d9-runc.SVRsd7.mount: Deactivated successfully. Apr 12 18:36:04.971348 kubelet[1892]: E0412 18:36:04.971319 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:05.971445 kubelet[1892]: E0412 18:36:05.971403 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:06.972267 kubelet[1892]: E0412 18:36:06.972233 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:07.477000 kubelet[1892]: E0412 18:36:07.476970 1892 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.39?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:36:07.972974 kubelet[1892]: E0412 18:36:07.972953 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:08.973370 kubelet[1892]: E0412 18:36:08.973340 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:09.595226 kubelet[1892]: W0412 18:36:09.595202 1892 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595437 kubelet[1892]: W0412 18:36:09.595425 1892 reflector.go:458] pkg/kubelet/config/apiserver.go:66: watch of *v1.Pod ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595526 kubelet[1892]: W0412 18:36:09.595515 1892 reflector.go:458] object-"calico-system"/"node-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595633 kubelet[1892]: W0412 18:36:09.595618 1892 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595731 kubelet[1892]: E0412 18:36:09.595704 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": http2: client connection lost" interval="800ms" Apr 12 18:36:09.595731 kubelet[1892]: W0412 18:36:09.595714 1892 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Node ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595825 kubelet[1892]: W0412 18:36:09.595753 1892 reflector.go:458] object-"default"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.595825 kubelet[1892]: E0412 18:36:09.595804 1892 desired_state_of_world_populator.go:320] "Error processing volume" err="error processing PVC default/test-dynamic-volume-claim: failed to fetch PVC from API server: Get \"https://10.200.20.38:6443/api/v1/namespaces/default/persistentvolumeclaims/test-dynamic-volume-claim\": http2: client connection lost" pod="default/test-pod-1" volumeName="config" Apr 12 18:36:09.596016 kubelet[1892]: W0412 18:36:09.595910 1892 reflector.go:458] object-"calico-system"/"cni-config": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.596016 kubelet[1892]: W0412 18:36:09.595940 1892 reflector.go:458] object-"calico-system"/"tigera-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.596092 kubelet[1892]: E0412 18:36:09.595892 1892 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"calico-node-qqj2g.17c59c3061a2e899", GenerateName:"", Namespace:"calico-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"calico-system", Name:"calico-node-qqj2g", UID:"8d291a4c-913e-49a0-a305-612ae3a9a517", APIVersion:"v1", ResourceVersion:"1096", FieldPath:"spec.containers{calico-node}"}, Reason:"Unhealthy", Message:"Readiness probe failed: 2024-04-12 18:36:04.891 [INFO][433] confd/health.go 180: Number of node(s) with BGP peering established = 1\ncalico/node is not ready: felix is not ready: readiness probe reporting 503\n", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.39"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 36, 4, 894771353, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 36, 4, 894771353, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.39"}': 'Post "https://10.200.20.38:6443/api/v1/namespaces/calico-system/events": http2: client connection lost'(may retry after sleeping) Apr 12 18:36:09.596092 kubelet[1892]: W0412 18:36:09.595963 1892 reflector.go:458] object-"kube-system"/"kube-proxy": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.596187 kubelet[1892]: W0412 18:36:09.595982 1892 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.596187 kubelet[1892]: E0412 18:36:09.595656 1892 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.39?timeout=10s\": http2: client connection lost" Apr 12 18:36:09.596187 kubelet[1892]: W0412 18:36:09.595996 1892 reflector.go:458] object-"kube-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.596187 kubelet[1892]: E0412 18:36:09.596002 1892 kubelet_node_status.go:527] "Unable to update node status" err="update node status exceeds retry count" Apr 12 18:36:09.596187 kubelet[1892]: W0412 18:36:09.596025 1892 reflector.go:458] object-"calico-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Apr 12 18:36:09.973827 kubelet[1892]: E0412 18:36:09.973800 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:10.974625 kubelet[1892]: E0412 18:36:10.974600 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:11.976037 kubelet[1892]: E0412 18:36:11.976004 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:12.976647 kubelet[1892]: E0412 18:36:12.976617 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:13.977757 kubelet[1892]: E0412 18:36:13.977711 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:14.978856 kubelet[1892]: E0412 18:36:14.978820 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:15.979863 kubelet[1892]: E0412 18:36:15.979828 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:16.980877 kubelet[1892]: E0412 18:36:16.980845 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:17.982119 kubelet[1892]: E0412 18:36:17.982097 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:18.983246 kubelet[1892]: E0412 18:36:18.983215 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:19.983972 kubelet[1892]: E0412 18:36:19.983941 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:20.396966 kubelet[1892]: E0412 18:36:20.396873 1892 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.39?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Apr 12 18:36:20.984676 kubelet[1892]: E0412 18:36:20.984644 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:21.985286 kubelet[1892]: E0412 18:36:21.985252 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:22.986010 kubelet[1892]: E0412 18:36:22.985975 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:23.850113 kubelet[1892]: E0412 18:36:23.850083 1892 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:36:23.986542 kubelet[1892]: E0412 18:36:23.986519 1892 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"