Jul 2 07:56:00.055462 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:56:00.055498 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:00.055509 kernel: BIOS-provided physical RAM map: Jul 2 07:56:00.055518 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 2 07:56:00.055526 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Jul 2 07:56:00.055536 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Jul 2 07:56:00.055548 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Jul 2 07:56:00.055557 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Jul 2 07:56:00.055566 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Jul 2 07:56:00.055576 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Jul 2 07:56:00.055585 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Jul 2 07:56:00.055593 kernel: printk: bootconsole [earlyser0] enabled Jul 2 07:56:00.055603 kernel: NX (Execute Disable) protection: active Jul 2 07:56:00.055613 kernel: efi: EFI v2.70 by Microsoft Jul 2 07:56:00.055631 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Jul 2 07:56:00.055642 kernel: random: crng init done Jul 2 07:56:00.055653 kernel: SMBIOS 3.1.0 present. Jul 2 07:56:00.055663 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Jul 2 07:56:00.055673 kernel: Hypervisor detected: Microsoft Hyper-V Jul 2 07:56:00.055684 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Jul 2 07:56:00.055693 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Jul 2 07:56:00.055703 kernel: Hyper-V: Nested features: 0x1e0101 Jul 2 07:56:00.055715 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Jul 2 07:56:00.055725 kernel: Hyper-V: Using hypercall for remote TLB flush Jul 2 07:56:00.055736 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Jul 2 07:56:00.055746 kernel: tsc: Marking TSC unstable due to running on Hyper-V Jul 2 07:56:00.055757 kernel: tsc: Detected 2593.904 MHz processor Jul 2 07:56:00.055768 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:56:00.055779 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:56:00.055789 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Jul 2 07:56:00.055800 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:56:00.055810 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Jul 2 07:56:00.055823 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Jul 2 07:56:00.055835 kernel: Using GB pages for direct mapping Jul 2 07:56:00.055845 kernel: Secure boot disabled Jul 2 07:56:00.055857 kernel: ACPI: Early table checksum verification disabled Jul 2 07:56:00.055867 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Jul 2 07:56:00.055879 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055889 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055901 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 07:56:00.055920 kernel: ACPI: FACS 0x000000003FFFE000 000040 Jul 2 07:56:00.055932 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055944 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055955 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055967 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.055978 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.056013 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.056024 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 07:56:00.056035 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Jul 2 07:56:00.056046 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Jul 2 07:56:00.056058 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Jul 2 07:56:00.056069 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Jul 2 07:56:00.056081 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Jul 2 07:56:00.056093 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Jul 2 07:56:00.056108 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Jul 2 07:56:00.056119 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Jul 2 07:56:00.056131 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Jul 2 07:56:00.056143 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Jul 2 07:56:00.056155 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:56:00.056167 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:56:00.056178 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Jul 2 07:56:00.056190 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Jul 2 07:56:00.056202 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Jul 2 07:56:00.056216 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Jul 2 07:56:00.056229 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Jul 2 07:56:00.056241 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Jul 2 07:56:00.056252 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Jul 2 07:56:00.056264 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Jul 2 07:56:00.056275 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Jul 2 07:56:00.056288 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Jul 2 07:56:00.056300 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Jul 2 07:56:00.056312 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Jul 2 07:56:00.056326 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Jul 2 07:56:00.056338 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Jul 2 07:56:00.056350 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Jul 2 07:56:00.056362 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Jul 2 07:56:00.056374 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Jul 2 07:56:00.056388 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Jul 2 07:56:00.056401 kernel: Zone ranges: Jul 2 07:56:00.056413 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:56:00.056426 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:56:00.056441 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:56:00.056453 kernel: Movable zone start for each node Jul 2 07:56:00.056465 kernel: Early memory node ranges Jul 2 07:56:00.056476 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 2 07:56:00.056488 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Jul 2 07:56:00.056501 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Jul 2 07:56:00.056512 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Jul 2 07:56:00.056525 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Jul 2 07:56:00.056537 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:56:00.056551 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 2 07:56:00.056564 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Jul 2 07:56:00.056576 kernel: ACPI: PM-Timer IO Port: 0x408 Jul 2 07:56:00.056588 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Jul 2 07:56:00.056600 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:56:00.056613 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:56:00.056625 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:56:00.056638 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Jul 2 07:56:00.056650 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:56:00.056664 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Jul 2 07:56:00.056676 kernel: Booting paravirtualized kernel on Hyper-V Jul 2 07:56:00.056689 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:56:00.056701 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:56:00.056713 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:56:00.056725 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:56:00.056737 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:56:00.056749 kernel: Hyper-V: PV spinlocks enabled Jul 2 07:56:00.056762 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:56:00.056777 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Jul 2 07:56:00.056789 kernel: Policy zone: Normal Jul 2 07:56:00.056805 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:00.056818 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:56:00.056829 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:56:00.056841 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:56:00.056853 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:56:00.056866 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 308056K reserved, 0K cma-reserved) Jul 2 07:56:00.056881 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:56:00.056893 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:56:00.056915 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:56:00.056931 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:56:00.056946 kernel: rcu: RCU event tracing is enabled. Jul 2 07:56:00.056958 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:56:00.056970 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:56:00.057005 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:56:00.057021 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:56:00.057035 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:56:00.057049 kernel: Using NULL legacy PIC Jul 2 07:56:00.057070 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Jul 2 07:56:00.057083 kernel: Console: colour dummy device 80x25 Jul 2 07:56:00.057095 kernel: printk: console [tty1] enabled Jul 2 07:56:00.057108 kernel: printk: console [ttyS0] enabled Jul 2 07:56:00.057120 kernel: printk: bootconsole [earlyser0] disabled Jul 2 07:56:00.057134 kernel: ACPI: Core revision 20210730 Jul 2 07:56:00.057147 kernel: Failed to register legacy timer interrupt Jul 2 07:56:00.057159 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:56:00.057170 kernel: Hyper-V: Using IPI hypercalls Jul 2 07:56:00.057183 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.80 BogoMIPS (lpj=2593904) Jul 2 07:56:00.057195 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:56:00.057207 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:56:00.057219 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:56:00.057230 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:56:00.057242 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:56:00.057256 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:56:00.057269 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jul 2 07:56:00.057281 kernel: RETBleed: Vulnerable Jul 2 07:56:00.057293 kernel: Speculative Store Bypass: Vulnerable Jul 2 07:56:00.057305 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:56:00.057317 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:56:00.057328 kernel: GDS: Unknown: Dependent on hypervisor status Jul 2 07:56:00.057341 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:56:00.057352 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:56:00.057365 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:56:00.057380 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 2 07:56:00.057393 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 2 07:56:00.057406 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 2 07:56:00.057418 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:56:00.057430 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Jul 2 07:56:00.057442 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Jul 2 07:56:00.057454 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Jul 2 07:56:00.057466 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Jul 2 07:56:00.057479 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:56:00.057491 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:56:00.057503 kernel: LSM: Security Framework initializing Jul 2 07:56:00.057516 kernel: SELinux: Initializing. Jul 2 07:56:00.057531 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:56:00.057542 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:56:00.057555 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Jul 2 07:56:00.057567 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 2 07:56:00.057580 kernel: signal: max sigframe size: 3632 Jul 2 07:56:00.057593 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:56:00.057606 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:56:00.057618 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:56:00.057632 kernel: x86: Booting SMP configuration: Jul 2 07:56:00.057645 kernel: .... node #0, CPUs: #1 Jul 2 07:56:00.057661 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Jul 2 07:56:00.057675 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:56:00.057688 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:56:00.057701 kernel: smpboot: Max logical packages: 1 Jul 2 07:56:00.057714 kernel: smpboot: Total of 2 processors activated (10375.61 BogoMIPS) Jul 2 07:56:00.057727 kernel: devtmpfs: initialized Jul 2 07:56:00.057740 kernel: x86/mm: Memory block size: 128MB Jul 2 07:56:00.057753 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Jul 2 07:56:00.057768 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:56:00.057781 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:56:00.057795 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:56:00.057808 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:56:00.057821 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:56:00.057834 kernel: audit: type=2000 audit(1719906958.026:1): state=initialized audit_enabled=0 res=1 Jul 2 07:56:00.057846 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:56:00.057859 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:56:00.057870 kernel: cpuidle: using governor menu Jul 2 07:56:00.057884 kernel: ACPI: bus type PCI registered Jul 2 07:56:00.057898 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:56:00.057911 kernel: dca service started, version 1.12.1 Jul 2 07:56:00.057922 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:56:00.057934 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:56:00.057946 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:56:00.057958 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:56:00.057971 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:56:00.057997 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:56:00.058014 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:56:00.058027 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:56:00.058040 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:56:00.058052 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:56:00.058065 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:56:00.058077 kernel: ACPI: Interpreter enabled Jul 2 07:56:00.058089 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:56:00.058101 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:56:00.058113 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:56:00.058129 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Jul 2 07:56:00.058141 kernel: iommu: Default domain type: Translated Jul 2 07:56:00.058152 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:56:00.058164 kernel: vgaarb: loaded Jul 2 07:56:00.058175 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:56:00.058188 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:56:00.058201 kernel: PTP clock support registered Jul 2 07:56:00.058213 kernel: Registered efivars operations Jul 2 07:56:00.058226 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:56:00.058240 kernel: PCI: System does not support PCI Jul 2 07:56:00.058255 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Jul 2 07:56:00.058267 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:56:00.058280 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:56:00.058292 kernel: pnp: PnP ACPI init Jul 2 07:56:00.058305 kernel: pnp: PnP ACPI: found 3 devices Jul 2 07:56:00.058319 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:56:00.058333 kernel: NET: Registered PF_INET protocol family Jul 2 07:56:00.058346 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:56:00.058361 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:56:00.058374 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:56:00.058387 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:56:00.058399 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:56:00.058412 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:56:00.058425 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:56:00.058439 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:56:00.058453 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:56:00.058464 kernel: NET: Registered PF_XDP protocol family Jul 2 07:56:00.058478 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:56:00.058490 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:56:00.058501 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Jul 2 07:56:00.058512 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:56:00.058523 kernel: Initialise system trusted keyrings Jul 2 07:56:00.058534 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:56:00.058547 kernel: Key type asymmetric registered Jul 2 07:56:00.058561 kernel: Asymmetric key parser 'x509' registered Jul 2 07:56:00.058575 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:56:00.058591 kernel: io scheduler mq-deadline registered Jul 2 07:56:00.058603 kernel: io scheduler kyber registered Jul 2 07:56:00.058614 kernel: io scheduler bfq registered Jul 2 07:56:00.058625 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:56:00.058639 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:56:00.058651 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:56:00.058664 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:56:00.058676 kernel: i8042: PNP: No PS/2 controller found. Jul 2 07:56:00.058865 kernel: rtc_cmos 00:02: registered as rtc0 Jul 2 07:56:00.058980 kernel: rtc_cmos 00:02: setting system clock to 2024-07-02T07:55:59 UTC (1719906959) Jul 2 07:56:00.059139 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Jul 2 07:56:00.059152 kernel: fail to initialize ptp_kvm Jul 2 07:56:00.059160 kernel: intel_pstate: CPU model not supported Jul 2 07:56:00.060778 kernel: efifb: probing for efifb Jul 2 07:56:00.060796 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 07:56:00.060810 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 07:56:00.060824 kernel: efifb: scrolling: redraw Jul 2 07:56:00.060843 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 07:56:00.060857 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:56:00.060871 kernel: fb0: EFI VGA frame buffer device Jul 2 07:56:00.060886 kernel: pstore: Registered efi as persistent store backend Jul 2 07:56:00.060899 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:56:00.060912 kernel: Segment Routing with IPv6 Jul 2 07:56:00.060926 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:56:00.060940 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:56:00.060954 kernel: Key type dns_resolver registered Jul 2 07:56:00.060970 kernel: IPI shorthand broadcast: enabled Jul 2 07:56:00.060991 kernel: sched_clock: Marking stable (712128100, 19671000)->(945875400, -214076300) Jul 2 07:56:00.061003 kernel: registered taskstats version 1 Jul 2 07:56:00.061015 kernel: Loading compiled-in X.509 certificates Jul 2 07:56:00.061033 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:56:00.061045 kernel: Key type .fscrypt registered Jul 2 07:56:00.061058 kernel: Key type fscrypt-provisioning registered Jul 2 07:56:00.061070 kernel: pstore: Using crash dump compression: deflate Jul 2 07:56:00.061088 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:56:00.061100 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:56:00.061111 kernel: ima: No architecture policies found Jul 2 07:56:00.061122 kernel: clk: Disabling unused clocks Jul 2 07:56:00.061135 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:56:00.061147 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:56:00.061159 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:56:00.061173 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:56:00.061186 kernel: Run /init as init process Jul 2 07:56:00.061199 kernel: with arguments: Jul 2 07:56:00.061215 kernel: /init Jul 2 07:56:00.061224 kernel: with environment: Jul 2 07:56:00.061234 kernel: HOME=/ Jul 2 07:56:00.061245 kernel: TERM=linux Jul 2 07:56:00.061255 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:56:00.061270 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:56:00.061284 systemd[1]: Detected virtualization microsoft. Jul 2 07:56:00.061299 systemd[1]: Detected architecture x86-64. Jul 2 07:56:00.061311 systemd[1]: Running in initrd. Jul 2 07:56:00.061322 systemd[1]: No hostname configured, using default hostname. Jul 2 07:56:00.061335 systemd[1]: Hostname set to . Jul 2 07:56:00.061347 systemd[1]: Initializing machine ID from random generator. Jul 2 07:56:00.061359 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:56:00.061372 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:56:00.061383 systemd[1]: Reached target cryptsetup.target. Jul 2 07:56:00.061396 systemd[1]: Reached target paths.target. Jul 2 07:56:00.061411 systemd[1]: Reached target slices.target. Jul 2 07:56:00.061423 systemd[1]: Reached target swap.target. Jul 2 07:56:00.061434 systemd[1]: Reached target timers.target. Jul 2 07:56:00.061448 systemd[1]: Listening on iscsid.socket. Jul 2 07:56:00.061462 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:56:00.061475 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:56:00.061487 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:56:00.061505 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:56:00.061519 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:56:00.061534 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:56:00.061548 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:56:00.061564 systemd[1]: Reached target sockets.target. Jul 2 07:56:00.061579 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:56:00.061591 systemd[1]: Finished network-cleanup.service. Jul 2 07:56:00.061604 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:56:00.061617 systemd[1]: Starting systemd-journald.service... Jul 2 07:56:00.061632 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:56:00.061644 systemd[1]: Starting systemd-resolved.service... Jul 2 07:56:00.061659 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:56:00.061684 systemd-journald[183]: Journal started Jul 2 07:56:00.061767 systemd-journald[183]: Runtime Journal (/run/log/journal/00dcc83a07194267be8d4dc5951fea71) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:56:00.059935 systemd-modules-load[184]: Inserted module 'overlay' Jul 2 07:56:00.067879 systemd[1]: Started systemd-journald.service. Jul 2 07:56:00.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.089795 kernel: audit: type=1130 audit(1719906960.074:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.075596 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:56:00.090094 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:56:00.093645 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:56:00.104723 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:56:00.126316 kernel: audit: type=1130 audit(1719906960.088:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.123784 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:56:00.142744 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:56:00.137515 systemd-resolved[185]: Positive Trust Anchors: Jul 2 07:56:00.137526 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:56:00.137563 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:56:00.140820 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:56:00.163187 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:56:00.167873 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:56:00.199889 kernel: audit: type=1130 audit(1719906960.092:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.199926 kernel: audit: type=1130 audit(1719906960.102:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.170926 systemd-resolved[185]: Defaulting to hostname 'linux'. Jul 2 07:56:00.194390 systemd[1]: Started systemd-resolved.service. Jul 2 07:56:00.204146 dracut-cmdline[200]: dracut-dracut-053 Jul 2 07:56:00.196229 systemd[1]: Reached target nss-lookup.target. Jul 2 07:56:00.209805 kernel: Bridge firewalling registered Jul 2 07:56:00.209838 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:00.210935 systemd-modules-load[184]: Inserted module 'br_netfilter' Jul 2 07:56:00.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.251043 kernel: audit: type=1130 audit(1719906960.145:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.251126 kernel: audit: type=1130 audit(1719906960.165:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.261543 kernel: audit: type=1130 audit(1719906960.195:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.288011 kernel: SCSI subsystem initialized Jul 2 07:56:00.312926 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:56:00.313028 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:56:00.321023 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:56:00.321087 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:56:00.325089 systemd-modules-load[184]: Inserted module 'dm_multipath' Jul 2 07:56:00.327959 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:56:00.349148 kernel: audit: type=1130 audit(1719906960.328:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.331967 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:56:00.357381 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:56:00.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.372005 kernel: audit: type=1130 audit(1719906960.358:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.376054 kernel: iscsi: registered transport (tcp) Jul 2 07:56:00.403179 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:56:00.403262 kernel: QLogic iSCSI HBA Driver Jul 2 07:56:00.433185 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:56:00.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.436258 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:56:00.492020 kernel: raid6: avx512x4 gen() 18414 MB/s Jul 2 07:56:00.509005 kernel: raid6: avx512x4 xor() 7011 MB/s Jul 2 07:56:00.528002 kernel: raid6: avx512x2 gen() 18470 MB/s Jul 2 07:56:00.548005 kernel: raid6: avx512x2 xor() 29811 MB/s Jul 2 07:56:00.566997 kernel: raid6: avx512x1 gen() 18306 MB/s Jul 2 07:56:00.587000 kernel: raid6: avx512x1 xor() 27344 MB/s Jul 2 07:56:00.607004 kernel: raid6: avx2x4 gen() 18458 MB/s Jul 2 07:56:00.625997 kernel: raid6: avx2x4 xor() 6489 MB/s Jul 2 07:56:00.645998 kernel: raid6: avx2x2 gen() 18484 MB/s Jul 2 07:56:00.668001 kernel: raid6: avx2x2 xor() 22315 MB/s Jul 2 07:56:00.687998 kernel: raid6: avx2x1 gen() 13863 MB/s Jul 2 07:56:00.706997 kernel: raid6: avx2x1 xor() 19493 MB/s Jul 2 07:56:00.726996 kernel: raid6: sse2x4 gen() 11720 MB/s Jul 2 07:56:00.745998 kernel: raid6: sse2x4 xor() 6418 MB/s Jul 2 07:56:00.765998 kernel: raid6: sse2x2 gen() 12914 MB/s Jul 2 07:56:00.786004 kernel: raid6: sse2x2 xor() 7546 MB/s Jul 2 07:56:00.804998 kernel: raid6: sse2x1 gen() 11620 MB/s Jul 2 07:56:00.827184 kernel: raid6: sse2x1 xor() 5922 MB/s Jul 2 07:56:00.827211 kernel: raid6: using algorithm avx2x2 gen() 18484 MB/s Jul 2 07:56:00.827222 kernel: raid6: .... xor() 22315 MB/s, rmw enabled Jul 2 07:56:00.830331 kernel: raid6: using avx512x2 recovery algorithm Jul 2 07:56:00.849018 kernel: xor: automatically using best checksumming function avx Jul 2 07:56:00.945014 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:56:00.953436 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:56:00.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.956000 audit: BPF prog-id=7 op=LOAD Jul 2 07:56:00.956000 audit: BPF prog-id=8 op=LOAD Jul 2 07:56:00.958346 systemd[1]: Starting systemd-udevd.service... Jul 2 07:56:00.973376 systemd-udevd[383]: Using default interface naming scheme 'v252'. Jul 2 07:56:00.979961 systemd[1]: Started systemd-udevd.service. Jul 2 07:56:00.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:00.984978 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:56:01.004624 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Jul 2 07:56:01.037111 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:56:01.039857 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:56:01.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:01.078469 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:56:01.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:01.125009 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:56:01.152014 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:56:01.157006 kernel: hv_vmbus: Vmbus version:5.2 Jul 2 07:56:01.171013 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 07:56:01.171087 kernel: AES CTR mode by8 optimization enabled Jul 2 07:56:01.195009 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 07:56:01.195068 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 07:56:01.220336 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 07:56:01.220409 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 07:56:01.220423 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 07:56:01.228669 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 07:56:01.228737 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 07:56:01.236609 kernel: scsi host0: storvsc_host_t Jul 2 07:56:01.243016 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 07:56:01.246174 kernel: scsi host1: storvsc_host_t Jul 2 07:56:01.246386 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 07:56:01.280234 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 07:56:01.280483 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 07:56:01.282021 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 07:56:01.282216 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 07:56:01.288905 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 07:56:01.289162 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 07:56:01.296738 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 07:56:01.297034 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 07:56:01.302014 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:56:01.307020 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 07:56:01.386974 kernel: hv_netvsc 002248a0-7298-0022-48a0-7298002248a0 eth0: VF slot 1 added Jul 2 07:56:01.398165 kernel: hv_vmbus: registering driver hv_pci Jul 2 07:56:01.406014 kernel: hv_pci e40fa2f3-7326-44fa-89a1-eee06bdf48ae: PCI VMBus probing: Using version 0x10004 Jul 2 07:56:01.419021 kernel: hv_pci e40fa2f3-7326-44fa-89a1-eee06bdf48ae: PCI host bridge to bus 7326:00 Jul 2 07:56:01.419255 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (448) Jul 2 07:56:01.426965 kernel: pci_bus 7326:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Jul 2 07:56:01.437020 kernel: pci_bus 7326:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 07:56:01.437239 kernel: pci 7326:00:02.0: [15b3:1016] type 00 class 0x020000 Jul 2 07:56:01.433808 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:56:01.451282 kernel: pci 7326:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:56:01.459419 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:56:01.473013 kernel: pci 7326:00:02.0: enabling Extended Tags Jul 2 07:56:01.486013 kernel: pci 7326:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7326:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Jul 2 07:56:01.495009 kernel: pci_bus 7326:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 07:56:01.497847 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:56:01.501997 kernel: pci 7326:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Jul 2 07:56:01.506400 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:56:01.518322 systemd[1]: Starting disk-uuid.service... Jul 2 07:56:01.620015 kernel: mlx5_core 7326:00:02.0: firmware version: 14.30.1284 Jul 2 07:56:01.690092 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:56:01.793011 kernel: mlx5_core 7326:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 07:56:01.878027 kernel: mlx5_core 7326:00:02.0: Supported tc offload range - chains: 1, prios: 1 Jul 2 07:56:01.878300 kernel: mlx5_core 7326:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Jul 2 07:56:01.890428 kernel: hv_netvsc 002248a0-7298-0022-48a0-7298002248a0 eth0: VF registering: eth1 Jul 2 07:56:01.890673 kernel: mlx5_core 7326:00:02.0 eth1: joined to eth0 Jul 2 07:56:01.903019 kernel: mlx5_core 7326:00:02.0 enP29478s1: renamed from eth1 Jul 2 07:56:02.538009 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:56:02.539219 disk-uuid[550]: The operation has completed successfully. Jul 2 07:56:02.610797 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:56:02.610904 systemd[1]: Finished disk-uuid.service. Jul 2 07:56:02.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.622206 systemd[1]: Starting verity-setup.service... Jul 2 07:56:02.644014 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:56:02.723082 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:56:02.727706 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:56:02.730848 systemd[1]: Finished verity-setup.service. Jul 2 07:56:02.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.803010 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:56:02.803759 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:56:02.807098 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:56:02.811109 systemd[1]: Starting ignition-setup.service... Jul 2 07:56:02.815661 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:56:02.840237 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:02.840326 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:02.840348 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:02.869320 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:56:02.888655 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:56:02.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.890000 audit: BPF prog-id=9 op=LOAD Jul 2 07:56:02.894630 systemd[1]: Starting systemd-networkd.service... Jul 2 07:56:02.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.916830 systemd[1]: Finished ignition-setup.service. Jul 2 07:56:02.920385 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:56:02.925466 systemd-networkd[834]: lo: Link UP Jul 2 07:56:02.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.925470 systemd-networkd[834]: lo: Gained carrier Jul 2 07:56:02.926362 systemd-networkd[834]: Enumeration completed Jul 2 07:56:02.927222 systemd[1]: Started systemd-networkd.service. Jul 2 07:56:02.929171 systemd[1]: Reached target network.target. Jul 2 07:56:02.932103 systemd-networkd[834]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:56:02.934610 systemd[1]: Starting iscsiuio.service... Jul 2 07:56:02.951441 systemd[1]: Started iscsiuio.service. Jul 2 07:56:02.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.954683 systemd[1]: Starting iscsid.service... Jul 2 07:56:02.960104 iscsid[841]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:56:02.960104 iscsid[841]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:56:02.960104 iscsid[841]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:56:02.960104 iscsid[841]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:56:02.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.982289 iscsid[841]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:56:02.982289 iscsid[841]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:56:02.961655 systemd[1]: Started iscsid.service. Jul 2 07:56:02.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:02.978232 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:56:02.991620 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:56:03.005025 kernel: mlx5_core 7326:00:02.0 enP29478s1: Link up Jul 2 07:56:02.994427 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:56:03.001327 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:56:03.005040 systemd[1]: Reached target remote-fs.target. Jul 2 07:56:03.007821 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:56:03.026117 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:56:03.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.034998 kernel: hv_netvsc 002248a0-7298-0022-48a0-7298002248a0 eth0: Data path switched to VF: enP29478s1 Jul 2 07:56:03.040001 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:03.040227 systemd-networkd[834]: enP29478s1: Link UP Jul 2 07:56:03.040369 systemd-networkd[834]: eth0: Link UP Jul 2 07:56:03.040581 systemd-networkd[834]: eth0: Gained carrier Jul 2 07:56:03.044707 systemd-networkd[834]: enP29478s1: Gained carrier Jul 2 07:56:03.070097 systemd-networkd[834]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:56:03.724419 ignition[837]: Ignition 2.14.0 Jul 2 07:56:03.724438 ignition[837]: Stage: fetch-offline Jul 2 07:56:03.724543 ignition[837]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:03.724602 ignition[837]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:03.760831 ignition[837]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:03.761090 ignition[837]: parsed url from cmdline: "" Jul 2 07:56:03.763567 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:56:03.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.761097 ignition[837]: no config URL provided Jul 2 07:56:03.767663 systemd[1]: Starting ignition-fetch.service... Jul 2 07:56:03.761105 ignition[837]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:56:03.761116 ignition[837]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:56:03.761128 ignition[837]: failed to fetch config: resource requires networking Jul 2 07:56:03.761517 ignition[837]: Ignition finished successfully Jul 2 07:56:03.777194 ignition[860]: Ignition 2.14.0 Jul 2 07:56:03.777202 ignition[860]: Stage: fetch Jul 2 07:56:03.777337 ignition[860]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:03.777363 ignition[860]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:03.784325 ignition[860]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:03.784467 ignition[860]: parsed url from cmdline: "" Jul 2 07:56:03.784471 ignition[860]: no config URL provided Jul 2 07:56:03.784479 ignition[860]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:56:03.784488 ignition[860]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:56:03.784539 ignition[860]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 07:56:03.882779 ignition[860]: GET result: OK Jul 2 07:56:03.882897 ignition[860]: config has been read from IMDS userdata Jul 2 07:56:03.882919 ignition[860]: parsing config with SHA512: a2b9f0b6d17e2bd51c84bfe9514659fe0682306b139c2392c12fdbb9ab17dcffdf8c0aaaea01262adfb8d5f5f5e5c053947e117bf5784af3c78f09cc285193f9 Jul 2 07:56:03.886487 unknown[860]: fetched base config from "system" Jul 2 07:56:03.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.887046 ignition[860]: fetch: fetch complete Jul 2 07:56:03.886495 unknown[860]: fetched base config from "system" Jul 2 07:56:03.887053 ignition[860]: fetch: fetch passed Jul 2 07:56:03.886504 unknown[860]: fetched user config from "azure" Jul 2 07:56:03.887121 ignition[860]: Ignition finished successfully Jul 2 07:56:03.888721 systemd[1]: Finished ignition-fetch.service. Jul 2 07:56:03.891776 systemd[1]: Starting ignition-kargs.service... Jul 2 07:56:03.904619 ignition[866]: Ignition 2.14.0 Jul 2 07:56:03.904626 ignition[866]: Stage: kargs Jul 2 07:56:03.904763 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:03.904792 ignition[866]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:03.909257 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:03.911123 ignition[866]: kargs: kargs passed Jul 2 07:56:03.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.912837 systemd[1]: Finished ignition-kargs.service. Jul 2 07:56:03.911203 ignition[866]: Ignition finished successfully Jul 2 07:56:03.918019 systemd[1]: Starting ignition-disks.service... Jul 2 07:56:03.927528 ignition[872]: Ignition 2.14.0 Jul 2 07:56:03.927538 ignition[872]: Stage: disks Jul 2 07:56:03.927698 ignition[872]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:03.927728 ignition[872]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:03.930716 ignition[872]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:03.932803 ignition[872]: disks: disks passed Jul 2 07:56:03.932870 ignition[872]: Ignition finished successfully Jul 2 07:56:03.935909 systemd[1]: Finished ignition-disks.service. Jul 2 07:56:03.942501 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:56:03.946276 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:56:03.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.950289 systemd[1]: Reached target local-fs.target. Jul 2 07:56:03.953683 systemd[1]: Reached target sysinit.target. Jul 2 07:56:03.956948 systemd[1]: Reached target basic.target. Jul 2 07:56:03.961128 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:56:03.984129 systemd-fsck[880]: ROOT: clean, 614/7326000 files, 481076/7359488 blocks Jul 2 07:56:03.988321 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:56:03.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:03.993298 systemd[1]: Mounting sysroot.mount... Jul 2 07:56:04.012018 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:56:04.012494 systemd[1]: Mounted sysroot.mount. Jul 2 07:56:04.013457 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:56:04.021240 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:56:04.029241 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 07:56:04.033459 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:56:04.033511 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:56:04.040939 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:56:04.055396 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:56:04.058111 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:56:04.078271 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (890) Jul 2 07:56:04.078341 initrd-setup-root[895]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:56:04.091263 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:04.091287 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:04.091298 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:04.095538 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:56:04.102026 initrd-setup-root[921]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:56:04.108244 systemd-networkd[834]: eth0: Gained IPv6LL Jul 2 07:56:04.112451 initrd-setup-root[929]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:56:04.119475 initrd-setup-root[937]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:56:04.260091 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:56:04.268626 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:56:04.268666 kernel: audit: type=1130 audit(1719906964.263:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.265219 systemd[1]: Starting ignition-mount.service... Jul 2 07:56:04.281649 systemd[1]: Starting sysroot-boot.service... Jul 2 07:56:04.285524 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:04.285673 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:04.314902 ignition[957]: INFO : Ignition 2.14.0 Jul 2 07:56:04.314902 ignition[957]: INFO : Stage: mount Jul 2 07:56:04.314902 ignition[957]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:04.314902 ignition[957]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:04.340521 kernel: audit: type=1130 audit(1719906964.319:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.313915 systemd[1]: Finished sysroot-boot.service. Jul 2 07:56:04.342241 ignition[957]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:04.345193 ignition[957]: INFO : mount: mount passed Jul 2 07:56:04.345193 ignition[957]: INFO : Ignition finished successfully Jul 2 07:56:04.349314 systemd[1]: Finished ignition-mount.service. Jul 2 07:56:04.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.363017 kernel: audit: type=1130 audit(1719906964.350:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.492085 coreos-metadata[889]: Jul 02 07:56:04.491 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 07:56:04.499136 coreos-metadata[889]: Jul 02 07:56:04.499 INFO Fetch successful Jul 2 07:56:04.533156 coreos-metadata[889]: Jul 02 07:56:04.532 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 07:56:04.548674 coreos-metadata[889]: Jul 02 07:56:04.548 INFO Fetch successful Jul 2 07:56:04.555612 coreos-metadata[889]: Jul 02 07:56:04.555 INFO wrote hostname ci-3510.3.5-a-a4d27d43f9 to /sysroot/etc/hostname Jul 2 07:56:04.561150 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 07:56:04.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.577593 kernel: audit: type=1130 audit(1719906964.563:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:04.575375 systemd[1]: Starting ignition-files.service... Jul 2 07:56:04.583367 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:56:04.594008 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (968) Jul 2 07:56:04.594068 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:04.601211 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:04.601238 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:04.608879 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:56:04.622542 ignition[987]: INFO : Ignition 2.14.0 Jul 2 07:56:04.622542 ignition[987]: INFO : Stage: files Jul 2 07:56:04.627535 ignition[987]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:04.627535 ignition[987]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:04.639801 ignition[987]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:04.644035 ignition[987]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:56:04.647247 ignition[987]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:56:04.647247 ignition[987]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:56:04.659607 ignition[987]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:56:04.662843 ignition[987]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:56:04.665895 ignition[987]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:56:04.663272 unknown[987]: wrote ssh authorized keys file for user: core Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:56:04.671284 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:04.712777 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (987) Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175895082" Jul 2 07:56:04.712806 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175895082": device or resource busy Jul 2 07:56:04.712806 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3175895082", trying btrfs: device or resource busy Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175895082" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175895082" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3175895082" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3175895082" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777194419" Jul 2 07:56:04.712806 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777194419": device or resource busy Jul 2 07:56:04.712806 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem777194419", trying btrfs: device or resource busy Jul 2 07:56:04.712806 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777194419" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777194419" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem777194419" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem777194419" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:56:04.778641 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Jul 2 07:56:05.282612 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 2 07:56:05.683178 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 07:56:05.683178 ignition[987]: INFO : files: op(f): [started] processing unit "nvidia.service" Jul 2 07:56:05.683178 ignition[987]: INFO : files: op(f): [finished] processing unit "nvidia.service" Jul 2 07:56:05.683178 ignition[987]: INFO : files: op(10): [started] processing unit "waagent.service" Jul 2 07:56:05.683178 ignition[987]: INFO : files: op(10): [finished] processing unit "waagent.service" Jul 2 07:56:05.721457 kernel: audit: type=1130 audit(1719906965.689:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.721587 ignition[987]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Jul 2 07:56:05.721587 ignition[987]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Jul 2 07:56:05.721587 ignition[987]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" Jul 2 07:56:05.721587 ignition[987]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" Jul 2 07:56:05.721587 ignition[987]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:56:05.721587 ignition[987]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:56:05.721587 ignition[987]: INFO : files: files passed Jul 2 07:56:05.721587 ignition[987]: INFO : Ignition finished successfully Jul 2 07:56:05.787209 kernel: audit: type=1130 audit(1719906965.726:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.787246 kernel: audit: type=1130 audit(1719906965.743:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.787264 kernel: audit: type=1131 audit(1719906965.743:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.688327 systemd[1]: Finished ignition-files.service. Jul 2 07:56:05.692067 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:56:05.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.793808 initrd-setup-root-after-ignition[1011]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:56:05.817459 kernel: audit: type=1130 audit(1719906965.792:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.817504 kernel: audit: type=1131 audit(1719906965.792:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.708023 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:56:05.714304 systemd[1]: Starting ignition-quench.service... Jul 2 07:56:05.721655 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:56:05.727934 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:56:05.728050 systemd[1]: Finished ignition-quench.service. Jul 2 07:56:05.744175 systemd[1]: Reached target ignition-complete.target. Jul 2 07:56:05.769800 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:56:05.791488 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:56:05.791606 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:56:05.794070 systemd[1]: Reached target initrd-fs.target. Jul 2 07:56:05.817534 systemd[1]: Reached target initrd.target. Jul 2 07:56:05.819237 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:56:05.820288 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:56:05.858758 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:56:05.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.861777 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:56:05.873845 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:56:05.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.875102 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:56:05.875492 systemd[1]: Stopped target timers.target. Jul 2 07:56:05.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.937141 ignition[1025]: INFO : Ignition 2.14.0 Jul 2 07:56:05.937141 ignition[1025]: INFO : Stage: umount Jul 2 07:56:05.937141 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:05.937141 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 07:56:05.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.875900 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:56:05.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.957764 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 07:56:05.957764 ignition[1025]: INFO : umount: umount passed Jul 2 07:56:05.957764 ignition[1025]: INFO : Ignition finished successfully Jul 2 07:56:05.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.876082 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:56:05.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.876479 systemd[1]: Stopped target initrd.target. Jul 2 07:56:05.876776 systemd[1]: Stopped target basic.target. Jul 2 07:56:05.877201 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:56:05.877598 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:56:05.878051 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:56:05.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.878498 systemd[1]: Stopped target remote-fs.target. Jul 2 07:56:05.878923 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:56:05.879378 systemd[1]: Stopped target sysinit.target. Jul 2 07:56:05.879800 systemd[1]: Stopped target local-fs.target. Jul 2 07:56:05.880217 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:56:06.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.880597 systemd[1]: Stopped target swap.target. Jul 2 07:56:06.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.880958 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:56:05.881107 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:56:06.020000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:56:05.881491 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:56:05.881746 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:56:06.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.881859 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:56:05.882577 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:56:06.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.882700 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:56:05.882883 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:56:05.883009 systemd[1]: Stopped ignition-files.service. Jul 2 07:56:05.883271 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:56:05.883391 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 07:56:05.884808 systemd[1]: Stopping ignition-mount.service... Jul 2 07:56:06.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:05.889052 systemd[1]: Stopping iscsiuio.service... Jul 2 07:56:05.889416 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:56:05.889567 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:56:05.922359 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:56:05.923651 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:56:05.926228 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:56:05.928588 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:56:05.931975 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:56:05.939822 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:56:05.939940 systemd[1]: Stopped iscsiuio.service. Jul 2 07:56:05.946637 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:56:05.946737 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:56:05.956586 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:56:05.957161 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:56:05.957288 systemd[1]: Stopped ignition-mount.service. Jul 2 07:56:05.963091 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:56:05.963156 systemd[1]: Stopped ignition-disks.service. Jul 2 07:56:05.966909 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:56:05.966966 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:56:05.970762 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:56:05.970821 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:56:05.972690 systemd[1]: Stopped target network.target. Jul 2 07:56:05.974412 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:56:05.974476 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:56:05.978146 systemd[1]: Stopped target paths.target. Jul 2 07:56:05.979866 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:56:05.983052 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:56:05.985365 systemd[1]: Stopped target slices.target. Jul 2 07:56:05.987072 systemd[1]: Stopped target sockets.target. Jul 2 07:56:05.988823 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:56:05.988864 systemd[1]: Closed iscsid.socket. Jul 2 07:56:05.992048 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:56:05.992101 systemd[1]: Closed iscsiuio.socket. Jul 2 07:56:05.995815 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:56:05.995887 systemd[1]: Stopped ignition-setup.service. Jul 2 07:56:06.000199 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:56:06.003637 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:56:06.007060 systemd-networkd[834]: eth0: DHCPv6 lease lost Jul 2 07:56:06.083000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:56:06.009346 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:56:06.009474 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:56:06.014928 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:56:06.015052 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:56:06.021673 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:56:06.021721 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:56:06.025467 systemd[1]: Stopping network-cleanup.service... Jul 2 07:56:06.028769 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:56:06.028832 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:56:06.033191 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:56:06.033252 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:56:06.039633 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:56:06.039687 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:56:06.048177 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:56:06.056839 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:56:06.057432 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:56:06.057570 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:56:06.061849 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:56:06.061904 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:56:06.067220 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:56:06.067285 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:56:06.151034 kernel: hv_netvsc 002248a0-7298-0022-48a0-7298002248a0 eth0: Data path switched from VF: enP29478s1 Jul 2 07:56:06.181453 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:56:06.181543 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:56:06.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.185530 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:56:06.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.185587 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:56:06.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.189105 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:56:06.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.189166 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:56:06.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.192056 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:56:06.210094 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:56:06.210180 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:56:06.214073 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:56:06.214182 systemd[1]: Stopped network-cleanup.service. Jul 2 07:56:06.217734 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:56:06.217832 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:56:06.895263 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:56:06.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.895448 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:56:06.900856 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:56:06.904824 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:56:06.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:06.904905 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:56:06.913592 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:56:06.925193 systemd[1]: Switching root. Jul 2 07:56:06.953084 iscsid[841]: iscsid shutting down. Jul 2 07:56:06.954695 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Jul 2 07:56:06.954774 systemd-journald[183]: Journal stopped Jul 2 07:56:11.697619 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:56:11.697646 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:56:11.697659 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:56:11.697668 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:56:11.697679 kernel: SELinux: policy capability open_perms=1 Jul 2 07:56:11.697687 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:56:11.697700 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:56:11.697712 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:56:11.697723 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:56:11.697736 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:56:11.697751 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:56:11.697767 systemd[1]: Successfully loaded SELinux policy in 113.192ms. Jul 2 07:56:11.697788 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.352ms. Jul 2 07:56:11.697810 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:56:11.697832 systemd[1]: Detected virtualization microsoft. Jul 2 07:56:11.697849 systemd[1]: Detected architecture x86-64. Jul 2 07:56:11.697867 systemd[1]: Detected first boot. Jul 2 07:56:11.697884 systemd[1]: Hostname set to . Jul 2 07:56:11.697901 systemd[1]: Initializing machine ID from random generator. Jul 2 07:56:11.697929 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:56:11.697946 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:56:11.697966 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:56:11.698013 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:56:11.698035 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:56:11.698057 kernel: kauditd_printk_skb: 53 callbacks suppressed Jul 2 07:56:11.698075 kernel: audit: type=1334 audit(1719906971.234:90): prog-id=12 op=LOAD Jul 2 07:56:11.698096 kernel: audit: type=1334 audit(1719906971.234:91): prog-id=3 op=UNLOAD Jul 2 07:56:11.698116 kernel: audit: type=1334 audit(1719906971.238:92): prog-id=13 op=LOAD Jul 2 07:56:11.698132 kernel: audit: type=1334 audit(1719906971.242:93): prog-id=14 op=LOAD Jul 2 07:56:11.699682 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:56:11.699707 kernel: audit: type=1334 audit(1719906971.242:94): prog-id=4 op=UNLOAD Jul 2 07:56:11.699721 kernel: audit: type=1334 audit(1719906971.242:95): prog-id=5 op=UNLOAD Jul 2 07:56:11.699736 kernel: audit: type=1131 audit(1719906971.244:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.699756 systemd[1]: Stopped iscsid.service. Jul 2 07:56:11.699773 kernel: audit: type=1131 audit(1719906971.290:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.699788 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:56:11.699802 kernel: audit: type=1334 audit(1719906971.304:98): prog-id=12 op=UNLOAD Jul 2 07:56:11.699815 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:56:11.699829 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:56:11.699845 kernel: audit: type=1130 audit(1719906971.314:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.699870 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:56:11.699889 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:56:11.699905 systemd[1]: Created slice system-getty.slice. Jul 2 07:56:11.699922 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:56:11.699939 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:56:11.699956 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:56:11.699972 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:56:11.700010 systemd[1]: Created slice user.slice. Jul 2 07:56:11.700028 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:56:11.700048 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:56:11.700065 systemd[1]: Set up automount boot.automount. Jul 2 07:56:11.700082 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:56:11.700098 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:56:11.700113 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:56:11.700131 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:56:11.700147 systemd[1]: Reached target integritysetup.target. Jul 2 07:56:11.700162 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:56:11.700178 systemd[1]: Reached target remote-fs.target. Jul 2 07:56:11.700194 systemd[1]: Reached target slices.target. Jul 2 07:56:11.700208 systemd[1]: Reached target swap.target. Jul 2 07:56:11.700221 systemd[1]: Reached target torcx.target. Jul 2 07:56:11.700239 systemd[1]: Reached target veritysetup.target. Jul 2 07:56:11.700254 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:56:11.700273 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:56:11.700287 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:56:11.700303 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:56:11.700320 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:56:11.700337 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:56:11.700354 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:56:11.700368 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:56:11.700387 systemd[1]: Mounting media.mount... Jul 2 07:56:11.700403 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:11.700421 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:56:11.700437 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:56:11.700452 systemd[1]: Mounting tmp.mount... Jul 2 07:56:11.700469 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:56:11.700485 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:11.700502 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:56:11.700518 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:56:11.700535 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:11.700552 systemd[1]: Starting modprobe@drm.service... Jul 2 07:56:11.700569 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:11.700588 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:56:11.700606 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:11.700624 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:56:11.700643 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:56:11.700659 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:56:11.700675 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:56:11.700695 kernel: loop: module loaded Jul 2 07:56:11.700711 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:56:11.700726 systemd[1]: Stopped systemd-journald.service. Jul 2 07:56:11.700742 kernel: fuse: init (API version 7.34) Jul 2 07:56:11.700758 systemd[1]: Starting systemd-journald.service... Jul 2 07:56:11.700776 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:56:11.700795 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:56:11.700812 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:56:11.700831 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:56:11.700850 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:56:11.700867 systemd[1]: Stopped verity-setup.service. Jul 2 07:56:11.700885 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:11.700908 systemd-journald[1169]: Journal started Jul 2 07:56:11.701015 systemd-journald[1169]: Runtime Journal (/run/log/journal/ca972a7e52c8462b8afb67295acad325) is 8.0M, max 159.0M, 151.0M free. Jul 2 07:56:07.522000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:56:07.733000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:56:07.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:56:07.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:56:07.738000 audit: BPF prog-id=10 op=LOAD Jul 2 07:56:07.738000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:56:07.738000 audit: BPF prog-id=11 op=LOAD Jul 2 07:56:07.738000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:56:08.128000 audit[1059]: AVC avc: denied { associate } for pid=1059 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:56:08.128000 audit[1059]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1042 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.128000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:56:08.135000 audit[1059]: AVC avc: denied { associate } for pid=1059 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:56:08.135000 audit[1059]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1042 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:08.135000 audit: CWD cwd="/" Jul 2 07:56:08.135000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:08.135000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:08.135000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:56:11.234000 audit: BPF prog-id=12 op=LOAD Jul 2 07:56:11.234000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:56:11.238000 audit: BPF prog-id=13 op=LOAD Jul 2 07:56:11.242000 audit: BPF prog-id=14 op=LOAD Jul 2 07:56:11.242000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:56:11.242000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:56:11.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.304000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:56:11.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.641000 audit: BPF prog-id=15 op=LOAD Jul 2 07:56:11.641000 audit: BPF prog-id=16 op=LOAD Jul 2 07:56:11.641000 audit: BPF prog-id=17 op=LOAD Jul 2 07:56:11.641000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:56:11.641000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:56:11.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.692000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:56:11.692000 audit[1169]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe0ecbaa70 a2=4000 a3=7ffe0ecbab0c items=0 ppid=1 pid=1169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:11.692000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:56:11.233139 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:56:08.119695 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:56:11.245069 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:56:08.120115 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:56:08.120134 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:56:08.120172 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:56:08.120181 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:56:08.120227 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:56:08.120240 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:56:08.120434 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:56:08.120481 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:56:08.120495 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:56:08.124845 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:56:11.711754 systemd[1]: Started systemd-journald.service. Jul 2 07:56:11.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.124881 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:56:11.708182 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:56:08.124901 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:56:11.710236 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:56:08.124914 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:56:11.712112 systemd[1]: Mounted media.mount. Jul 2 07:56:08.124933 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:56:08.124945 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:56:10.760137 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:10.760399 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:10.760535 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:10.760706 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:10.760755 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:56:10.760809 /usr/lib/systemd/system-generators/torcx-generator[1059]: time="2024-07-02T07:56:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:56:11.714287 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:56:11.716341 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:56:11.718539 systemd[1]: Mounted tmp.mount. Jul 2 07:56:11.720607 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:56:11.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.723220 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:56:11.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.725594 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:56:11.725808 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:56:11.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.728218 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:11.728424 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:11.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.731035 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:56:11.731197 systemd[1]: Finished modprobe@drm.service. Jul 2 07:56:11.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.733579 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:11.733795 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:11.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.736183 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:56:11.736396 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:56:11.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.738651 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:11.738857 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:11.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.741035 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:56:11.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.743486 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:56:11.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.746344 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:56:11.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.749123 systemd[1]: Reached target network-pre.target. Jul 2 07:56:11.752698 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:56:11.756227 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:56:11.762091 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:56:11.766664 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:56:11.769700 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:56:11.771515 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:11.773081 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:56:11.774734 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:11.776324 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:56:11.782232 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:56:11.787520 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:56:11.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.791370 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:56:11.795765 systemd-journald[1169]: Time spent on flushing to /var/log/journal/ca972a7e52c8462b8afb67295acad325 is 31.855ms for 1117 entries. Jul 2 07:56:11.795765 systemd-journald[1169]: System Journal (/var/log/journal/ca972a7e52c8462b8afb67295acad325) is 8.0M, max 2.6G, 2.6G free. Jul 2 07:56:11.866173 systemd-journald[1169]: Received client request to flush runtime journal. Jul 2 07:56:11.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.801240 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:56:11.804953 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:56:11.866626 udevadm[1183]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:56:11.821497 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:56:11.823540 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:56:11.834407 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:56:11.867401 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:56:11.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.183387 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:56:12.761052 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:56:12.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.763000 audit: BPF prog-id=18 op=LOAD Jul 2 07:56:12.763000 audit: BPF prog-id=19 op=LOAD Jul 2 07:56:12.763000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:56:12.763000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:56:12.765321 systemd[1]: Starting systemd-udevd.service... Jul 2 07:56:12.783704 systemd-udevd[1186]: Using default interface naming scheme 'v252'. Jul 2 07:56:12.853626 systemd[1]: Started systemd-udevd.service. Jul 2 07:56:12.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.856000 audit: BPF prog-id=20 op=LOAD Jul 2 07:56:12.858123 systemd[1]: Starting systemd-networkd.service... Jul 2 07:56:12.886000 audit: BPF prog-id=21 op=LOAD Jul 2 07:56:12.887000 audit: BPF prog-id=22 op=LOAD Jul 2 07:56:12.887000 audit: BPF prog-id=23 op=LOAD Jul 2 07:56:12.889172 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:56:12.914070 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:56:12.951555 systemd[1]: Started systemd-userdbd.service. Jul 2 07:56:12.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.027263 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 07:56:13.027395 kernel: hv_vmbus: registering driver hv_utils Jul 2 07:56:13.023000 audit[1194]: AVC avc: denied { confidentiality } for pid=1194 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:56:13.044303 kernel: hv_vmbus: registering driver hv_balloon Jul 2 07:56:13.054124 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 07:56:13.072011 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:56:13.084589 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 07:56:13.084696 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 07:56:13.092150 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 07:56:13.092243 kernel: Console: switching to colour dummy device 80x25 Jul 2 07:56:13.100133 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 07:56:13.102413 systemd-networkd[1192]: lo: Link UP Jul 2 07:56:13.102428 systemd-networkd[1192]: lo: Gained carrier Jul 2 07:56:13.103428 systemd-networkd[1192]: Enumeration completed Jul 2 07:56:13.103562 systemd[1]: Started systemd-networkd.service. Jul 2 07:56:13.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.108133 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:56:13.114536 systemd-networkd[1192]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:56:13.122530 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 07:56:13.122655 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 07:56:13.122692 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 07:56:13.023000 audit[1194]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f29d9479b0 a1=f884 a2=7f64239b2bc5 a3=5 items=12 ppid=1186 pid=1194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:13.009120 systemd-journald[1169]: Time jumped backwards, rotating. Jul 2 07:56:13.009228 kernel: mlx5_core 7326:00:02.0 enP29478s1: Link up Jul 2 07:56:13.009524 kernel: hv_netvsc 002248a0-7298-0022-48a0-7298002248a0 eth0: Data path switched to VF: enP29478s1 Jul 2 07:56:13.009715 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1188) Jul 2 07:56:13.023000 audit: CWD cwd="/" Jul 2 07:56:13.023000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=1 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=2 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=3 name=(null) inode=15150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=4 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=5 name=(null) inode=15151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=6 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=7 name=(null) inode=15152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=8 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=9 name=(null) inode=15153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=10 name=(null) inode=15149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PATH item=11 name=(null) inode=15154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:13.023000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:56:12.956905 systemd-networkd[1192]: enP29478s1: Link UP Jul 2 07:56:12.957038 systemd-networkd[1192]: eth0: Link UP Jul 2 07:56:12.957044 systemd-networkd[1192]: eth0: Gained carrier Jul 2 07:56:12.964868 systemd-networkd[1192]: enP29478s1: Gained carrier Jul 2 07:56:12.986859 systemd-networkd[1192]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:56:13.086317 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:56:13.148683 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Jul 2 07:56:13.174116 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:56:13.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.178009 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:56:13.410074 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:56:13.438883 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:56:13.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.441470 systemd[1]: Reached target cryptsetup.target. Jul 2 07:56:13.444880 systemd[1]: Starting lvm2-activation.service... Jul 2 07:56:13.449928 lvm[1265]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:56:13.474970 systemd[1]: Finished lvm2-activation.service. Jul 2 07:56:13.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.477483 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:56:13.479559 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:56:13.479601 systemd[1]: Reached target local-fs.target. Jul 2 07:56:13.481622 systemd[1]: Reached target machines.target. Jul 2 07:56:13.485249 systemd[1]: Starting ldconfig.service... Jul 2 07:56:13.487365 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:13.487488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:13.488873 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:56:13.492168 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:56:13.496012 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:56:13.504091 systemd[1]: Starting systemd-sysext.service... Jul 2 07:56:13.507100 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1267 (bootctl) Jul 2 07:56:13.508804 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:56:13.617956 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:56:13.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.619900 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:56:13.775292 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:13.775584 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:56:14.048061 systemd-networkd[1192]: eth0: Gained IPv6LL Jul 2 07:56:14.053799 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:56:14.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.271677 kernel: loop0: detected capacity change from 0 to 211296 Jul 2 07:56:14.634688 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:56:14.663477 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:56:14.665674 kernel: loop1: detected capacity change from 0 to 211296 Jul 2 07:56:14.666625 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:56:14.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.673124 (sd-sysext)[1280]: Using extensions 'kubernetes'. Jul 2 07:56:14.673606 (sd-sysext)[1280]: Merged extensions into '/usr'. Jul 2 07:56:14.690974 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:14.692804 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:56:14.695041 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:14.698775 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:14.701821 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:14.704739 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:14.705885 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:14.706061 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:14.706209 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:14.710435 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:56:14.711759 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:14.712108 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:14.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.713677 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:14.713944 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:14.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.715767 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:14.715996 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:14.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.717029 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:14.717227 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:14.720292 systemd[1]: Finished systemd-sysext.service. Jul 2 07:56:14.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.722752 systemd[1]: Starting ensure-sysext.service... Jul 2 07:56:14.726863 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:56:14.736613 systemd[1]: Reloading. Jul 2 07:56:14.810994 /usr/lib/systemd/system-generators/torcx-generator[1307]: time="2024-07-02T07:56:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:56:14.811038 /usr/lib/systemd/system-generators/torcx-generator[1307]: time="2024-07-02T07:56:14Z" level=info msg="torcx already run" Jul 2 07:56:14.889542 systemd-fsck[1275]: fsck.fat 4.2 (2021-01-31) Jul 2 07:56:14.889542 systemd-fsck[1275]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:56:14.899464 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:56:14.920794 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:56:14.920816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:56:14.925492 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:56:14.937927 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:56:14.949879 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:56:15.008000 audit: BPF prog-id=24 op=LOAD Jul 2 07:56:15.008000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:56:15.010000 audit: BPF prog-id=25 op=LOAD Jul 2 07:56:15.010000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:56:15.010000 audit: BPF prog-id=26 op=LOAD Jul 2 07:56:15.010000 audit: BPF prog-id=27 op=LOAD Jul 2 07:56:15.010000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:56:15.010000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:56:15.011000 audit: BPF prog-id=28 op=LOAD Jul 2 07:56:15.011000 audit: BPF prog-id=29 op=LOAD Jul 2 07:56:15.011000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:56:15.011000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:56:15.013000 audit: BPF prog-id=30 op=LOAD Jul 2 07:56:15.013000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:56:15.013000 audit: BPF prog-id=31 op=LOAD Jul 2 07:56:15.013000 audit: BPF prog-id=32 op=LOAD Jul 2 07:56:15.013000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:56:15.013000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:56:15.017719 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:56:15.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.040470 systemd[1]: Finished ensure-sysext.service. Jul 2 07:56:15.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.045688 systemd[1]: Mounting boot.mount... Jul 2 07:56:15.047415 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:15.048554 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:15.051320 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:15.055153 systemd[1]: Starting modprobe@drm.service... Jul 2 07:56:15.059239 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:15.063512 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:15.067021 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:15.067088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:15.067205 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:15.067962 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:15.068148 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:15.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.070532 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:56:15.070732 systemd[1]: Finished modprobe@drm.service. Jul 2 07:56:15.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.073302 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:15.073463 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:15.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.075825 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:15.075977 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:15.078132 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:15.078182 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:15.084088 systemd[1]: Mounted boot.mount. Jul 2 07:56:15.102458 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:56:15.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.167524 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:56:15.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.171184 systemd[1]: Starting audit-rules.service... Jul 2 07:56:15.174537 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:56:15.178064 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:56:15.180000 audit: BPF prog-id=33 op=LOAD Jul 2 07:56:15.182910 systemd[1]: Starting systemd-resolved.service... Jul 2 07:56:15.186000 audit: BPF prog-id=34 op=LOAD Jul 2 07:56:15.189013 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:56:15.193233 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:56:15.196678 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:56:15.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.201063 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:56:15.207000 audit[1384]: SYSTEM_BOOT pid=1384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.211611 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:56:15.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.256400 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:56:15.308753 augenrules[1398]: No rules Jul 2 07:56:15.306000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:56:15.306000 audit[1398]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff35bac200 a2=420 a3=0 items=0 ppid=1378 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.306000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:56:15.309437 systemd[1]: Finished audit-rules.service. Jul 2 07:56:15.312160 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:56:15.314238 systemd[1]: Reached target time-set.target. Jul 2 07:56:15.324641 systemd-resolved[1382]: Positive Trust Anchors: Jul 2 07:56:15.324976 systemd-resolved[1382]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:56:15.325056 systemd-resolved[1382]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:56:15.348613 systemd-resolved[1382]: Using system hostname 'ci-3510.3.5-a-a4d27d43f9'. Jul 2 07:56:15.350735 systemd[1]: Started systemd-resolved.service. Jul 2 07:56:15.352841 systemd[1]: Reached target network.target. Jul 2 07:56:15.354690 systemd[1]: Reached target network-online.target. Jul 2 07:56:15.356504 systemd[1]: Reached target nss-lookup.target. Jul 2 07:56:15.458193 systemd-timesyncd[1383]: Contacted time server 188.125.64.6:123 (0.flatcar.pool.ntp.org). Jul 2 07:56:15.458295 systemd-timesyncd[1383]: Initial clock synchronization to Tue 2024-07-02 07:56:15.449779 UTC. Jul 2 07:56:16.558180 ldconfig[1266]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:56:16.569057 systemd[1]: Finished ldconfig.service. Jul 2 07:56:16.572620 systemd[1]: Starting systemd-update-done.service... Jul 2 07:56:16.579746 systemd[1]: Finished systemd-update-done.service. Jul 2 07:56:16.581718 systemd[1]: Reached target sysinit.target. Jul 2 07:56:16.583719 systemd[1]: Started motdgen.path. Jul 2 07:56:16.585157 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:56:16.587717 systemd[1]: Started logrotate.timer. Jul 2 07:56:16.589430 systemd[1]: Started mdadm.timer. Jul 2 07:56:16.590850 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:56:16.592885 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:56:16.592928 systemd[1]: Reached target paths.target. Jul 2 07:56:16.594680 systemd[1]: Reached target timers.target. Jul 2 07:56:16.596709 systemd[1]: Listening on dbus.socket. Jul 2 07:56:16.603191 systemd[1]: Starting docker.socket... Jul 2 07:56:16.607512 systemd[1]: Listening on sshd.socket. Jul 2 07:56:16.609173 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:16.609687 systemd[1]: Listening on docker.socket. Jul 2 07:56:16.611320 systemd[1]: Reached target sockets.target. Jul 2 07:56:16.612942 systemd[1]: Reached target basic.target. Jul 2 07:56:16.614697 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:56:16.614733 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:56:16.615860 systemd[1]: Starting containerd.service... Jul 2 07:56:16.618918 systemd[1]: Starting dbus.service... Jul 2 07:56:16.622295 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:56:16.625726 systemd[1]: Starting extend-filesystems.service... Jul 2 07:56:16.627838 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:56:16.629192 systemd[1]: Starting kubelet.service... Jul 2 07:56:16.633965 systemd[1]: Starting motdgen.service... Jul 2 07:56:16.639282 systemd[1]: Started nvidia.service. Jul 2 07:56:16.640459 jq[1409]: false Jul 2 07:56:16.642359 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:56:16.645670 systemd[1]: Starting sshd-keygen.service... Jul 2 07:56:16.651148 systemd[1]: Starting systemd-logind.service... Jul 2 07:56:16.654956 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:16.655070 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:56:16.655662 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:56:16.656721 systemd[1]: Starting update-engine.service... Jul 2 07:56:16.662016 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:56:16.666876 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:56:16.667129 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:56:16.669899 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:56:16.670196 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:56:16.680933 jq[1422]: true Jul 2 07:56:16.702841 jq[1432]: true Jul 2 07:56:16.726788 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:56:16.727023 systemd[1]: Finished motdgen.service. Jul 2 07:56:16.744074 dbus-daemon[1408]: [system] SELinux support is enabled Jul 2 07:56:16.744728 systemd[1]: Started dbus.service. Jul 2 07:56:16.749716 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:56:16.749768 systemd[1]: Reached target system-config.target. Jul 2 07:56:16.751890 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:56:16.751927 systemd[1]: Reached target user-config.target. Jul 2 07:56:16.793958 extend-filesystems[1410]: Found loop1 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda1 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda2 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda3 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found usr Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda4 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda6 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda7 Jul 2 07:56:16.796139 extend-filesystems[1410]: Found sda9 Jul 2 07:56:16.796139 extend-filesystems[1410]: Checking size of /dev/sda9 Jul 2 07:56:16.832380 bash[1457]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:56:16.821200 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:56:16.832612 env[1426]: time="2024-07-02T07:56:16.805894979Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:56:16.852947 extend-filesystems[1410]: Old size kept for /dev/sda9 Jul 2 07:56:16.855113 extend-filesystems[1410]: Found sr0 Jul 2 07:56:16.856545 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:56:16.856782 systemd[1]: Finished extend-filesystems.service. Jul 2 07:56:16.907465 env[1426]: time="2024-07-02T07:56:16.907385405Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:56:16.907670 env[1426]: time="2024-07-02T07:56:16.907626680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.910173 env[1426]: time="2024-07-02T07:56:16.909484118Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:16.910173 env[1426]: time="2024-07-02T07:56:16.909569373Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.911977 env[1426]: time="2024-07-02T07:56:16.911936847Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:16.911977 env[1426]: time="2024-07-02T07:56:16.911973428Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.912125 env[1426]: time="2024-07-02T07:56:16.911990919Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:56:16.912125 env[1426]: time="2024-07-02T07:56:16.912004512Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.912125 env[1426]: time="2024-07-02T07:56:16.912119153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.912495 env[1426]: time="2024-07-02T07:56:16.912459376Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:16.912766 env[1426]: time="2024-07-02T07:56:16.912724339Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:16.912766 env[1426]: time="2024-07-02T07:56:16.912754424Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:56:16.912887 env[1426]: time="2024-07-02T07:56:16.912832383Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:56:16.912887 env[1426]: time="2024-07-02T07:56:16.912853272Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:56:16.918439 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.927958547Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928049900Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928089380Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928145850Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928188528Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928210117Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928286278Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928322559Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928343148Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928364037Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928394322Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928413712Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.928588921Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:56:16.929134 env[1426]: time="2024-07-02T07:56:16.929003106Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:56:16.930105 env[1426]: time="2024-07-02T07:56:16.930079849Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:56:16.930232 env[1426]: time="2024-07-02T07:56:16.930213080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930314 env[1426]: time="2024-07-02T07:56:16.930300134Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:56:16.930533 env[1426]: time="2024-07-02T07:56:16.930433765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930622 env[1426]: time="2024-07-02T07:56:16.930609274Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930712 env[1426]: time="2024-07-02T07:56:16.930697729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930793 env[1426]: time="2024-07-02T07:56:16.930780186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930878 env[1426]: time="2024-07-02T07:56:16.930865342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.930956 env[1426]: time="2024-07-02T07:56:16.930943501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931035 env[1426]: time="2024-07-02T07:56:16.931021361Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931112 env[1426]: time="2024-07-02T07:56:16.931099420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931201 env[1426]: time="2024-07-02T07:56:16.931187975Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:56:16.931450 env[1426]: time="2024-07-02T07:56:16.931433148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931541 env[1426]: time="2024-07-02T07:56:16.931528298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931623 env[1426]: time="2024-07-02T07:56:16.931610256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.931706 env[1426]: time="2024-07-02T07:56:16.931693013Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:56:16.931805 env[1426]: time="2024-07-02T07:56:16.931785865Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:56:16.931883 env[1426]: time="2024-07-02T07:56:16.931870321Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:56:16.931973 env[1426]: time="2024-07-02T07:56:16.931959175Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:56:16.935126 env[1426]: time="2024-07-02T07:56:16.935083257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:56:16.935670 env[1426]: time="2024-07-02T07:56:16.935580199Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.936326813Z" level=info msg="Connect containerd service" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.936412268Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.937227346Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.937618843Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.937692805Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.937754573Z" level=info msg="containerd successfully booted in 0.146023s" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.940823483Z" level=info msg="Start subscribing containerd event" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.940883352Z" level=info msg="Start recovering state" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.940963710Z" level=info msg="Start event monitor" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.940993195Z" level=info msg="Start snapshots syncer" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.941008487Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:56:16.947337 env[1426]: time="2024-07-02T07:56:16.941020081Z" level=info msg="Start streaming server" Jul 2 07:56:16.937851 systemd[1]: Started containerd.service. Jul 2 07:56:16.948894 systemd-logind[1418]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:56:16.952000 systemd-logind[1418]: New seat seat0. Jul 2 07:56:16.956967 systemd[1]: Started systemd-logind.service. Jul 2 07:56:16.978715 update_engine[1419]: I0702 07:56:16.978080 1419 main.cc:92] Flatcar Update Engine starting Jul 2 07:56:16.996830 systemd[1]: Started update-engine.service. Jul 2 07:56:16.997192 update_engine[1419]: I0702 07:56:16.996907 1419 update_check_scheduler.cc:74] Next update check in 10m50s Jul 2 07:56:17.001765 systemd[1]: Started locksmithd.service. Jul 2 07:56:17.775313 systemd[1]: Started kubelet.service. Jul 2 07:56:17.866459 locksmithd[1483]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:56:18.540381 kubelet[1516]: E0702 07:56:18.540295 1516 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:18.542727 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:18.542897 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:18.543214 systemd[1]: kubelet.service: Consumed 1.161s CPU time. Jul 2 07:56:18.603495 sshd_keygen[1435]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:56:18.624446 systemd[1]: Finished sshd-keygen.service. Jul 2 07:56:18.628379 systemd[1]: Starting issuegen.service... Jul 2 07:56:18.631826 systemd[1]: Started waagent.service. Jul 2 07:56:18.638795 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:56:18.638999 systemd[1]: Finished issuegen.service. Jul 2 07:56:18.643842 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:56:18.660139 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:56:18.664560 systemd[1]: Started getty@tty1.service. Jul 2 07:56:18.669197 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:56:18.671956 systemd[1]: Reached target getty.target. Jul 2 07:56:18.673945 systemd[1]: Reached target multi-user.target. Jul 2 07:56:18.680832 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:56:18.691370 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:56:18.691533 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:56:18.693954 systemd[1]: Startup finished in 544ms (firmware) + 7.468s (loader) + 909ms (kernel) + 7.616s (initrd) + 11.568s (userspace) = 28.107s. Jul 2 07:56:18.816276 login[1535]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:56:18.817665 login[1536]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 07:56:18.830556 systemd[1]: Created slice user-500.slice. Jul 2 07:56:18.832130 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:56:18.836609 systemd-logind[1418]: New session 2 of user core. Jul 2 07:56:18.842784 systemd-logind[1418]: New session 1 of user core. Jul 2 07:56:18.846997 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:56:18.849070 systemd[1]: Starting user@500.service... Jul 2 07:56:18.857777 (systemd)[1539]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:18.955249 systemd[1539]: Queued start job for default target default.target. Jul 2 07:56:18.955910 systemd[1539]: Reached target paths.target. Jul 2 07:56:18.955940 systemd[1539]: Reached target sockets.target. Jul 2 07:56:18.955958 systemd[1539]: Reached target timers.target. Jul 2 07:56:18.955972 systemd[1539]: Reached target basic.target. Jul 2 07:56:18.956098 systemd[1]: Started user@500.service. Jul 2 07:56:18.957405 systemd[1]: Started session-1.scope. Jul 2 07:56:18.958196 systemd[1]: Started session-2.scope. Jul 2 07:56:18.959180 systemd[1539]: Reached target default.target. Jul 2 07:56:18.959433 systemd[1539]: Startup finished in 94ms. Jul 2 07:56:23.158752 waagent[1530]: 2024-07-02T07:56:23.158615Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 07:56:23.162823 waagent[1530]: 2024-07-02T07:56:23.162736Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 07:56:23.165273 waagent[1530]: 2024-07-02T07:56:23.165195Z INFO Daemon Daemon Python: 3.9.16 Jul 2 07:56:23.167701 waagent[1530]: 2024-07-02T07:56:23.167606Z INFO Daemon Daemon Run daemon Jul 2 07:56:23.170113 waagent[1530]: 2024-07-02T07:56:23.170047Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 07:56:23.183098 waagent[1530]: 2024-07-02T07:56:23.182963Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:56:23.192181 waagent[1530]: 2024-07-02T07:56:23.192058Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:56:23.196661 waagent[1530]: 2024-07-02T07:56:23.196576Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:56:23.198947 waagent[1530]: 2024-07-02T07:56:23.198881Z INFO Daemon Daemon Using waagent for provisioning Jul 2 07:56:23.202046 waagent[1530]: 2024-07-02T07:56:23.201982Z INFO Daemon Daemon Activate resource disk Jul 2 07:56:23.204461 waagent[1530]: 2024-07-02T07:56:23.204397Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 07:56:23.214513 waagent[1530]: 2024-07-02T07:56:23.214428Z INFO Daemon Daemon Found device: None Jul 2 07:56:23.216943 waagent[1530]: 2024-07-02T07:56:23.216868Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 07:56:23.220794 waagent[1530]: 2024-07-02T07:56:23.220728Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 07:56:23.226405 waagent[1530]: 2024-07-02T07:56:23.226336Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:56:23.229301 waagent[1530]: 2024-07-02T07:56:23.229237Z INFO Daemon Daemon Running default provisioning handler Jul 2 07:56:23.240224 waagent[1530]: 2024-07-02T07:56:23.240091Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 07:56:23.247784 waagent[1530]: 2024-07-02T07:56:23.247663Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 07:56:23.252002 waagent[1530]: 2024-07-02T07:56:23.251922Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 07:56:23.254328 waagent[1530]: 2024-07-02T07:56:23.254261Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 07:56:23.294698 waagent[1530]: 2024-07-02T07:56:23.294460Z INFO Daemon Daemon Successfully mounted dvd Jul 2 07:56:23.330126 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 07:56:23.339688 waagent[1530]: 2024-07-02T07:56:23.339525Z INFO Daemon Daemon Detect protocol endpoint Jul 2 07:56:23.342405 waagent[1530]: 2024-07-02T07:56:23.342313Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 07:56:23.345336 waagent[1530]: 2024-07-02T07:56:23.345255Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 07:56:23.348504 waagent[1530]: 2024-07-02T07:56:23.348429Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 07:56:23.351150 waagent[1530]: 2024-07-02T07:56:23.351077Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 07:56:23.353592 waagent[1530]: 2024-07-02T07:56:23.353525Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 07:56:23.391122 waagent[1530]: 2024-07-02T07:56:23.391032Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 07:56:23.397701 waagent[1530]: 2024-07-02T07:56:23.392028Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 07:56:23.397701 waagent[1530]: 2024-07-02T07:56:23.392560Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 07:56:23.563424 waagent[1530]: 2024-07-02T07:56:23.563182Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 07:56:23.572068 waagent[1530]: 2024-07-02T07:56:23.571977Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 07:56:23.577122 waagent[1530]: 2024-07-02T07:56:23.572455Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 07:56:23.680101 waagent[1530]: 2024-07-02T07:56:23.679952Z INFO Daemon Daemon Found private key matching thumbprint 01782FCA3BBDE33B9319589FD1DEC4EA13646439 Jul 2 07:56:23.684320 waagent[1530]: 2024-07-02T07:56:23.684226Z INFO Daemon Daemon Certificate with thumbprint 5BB4E11EB22389096BA18BC27696C0A5D567ABC6 has no matching private key. Jul 2 07:56:23.688517 waagent[1530]: 2024-07-02T07:56:23.688433Z INFO Daemon Daemon Fetch goal state completed Jul 2 07:56:23.712957 waagent[1530]: 2024-07-02T07:56:23.712880Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 9b7e3803-345e-4b03-ac26-cf5a0590a771 New eTag: 13059380622627701782] Jul 2 07:56:23.718196 waagent[1530]: 2024-07-02T07:56:23.718098Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:56:23.730320 waagent[1530]: 2024-07-02T07:56:23.730242Z INFO Daemon Daemon Starting provisioning Jul 2 07:56:23.733101 waagent[1530]: 2024-07-02T07:56:23.733020Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 07:56:23.735437 waagent[1530]: 2024-07-02T07:56:23.735367Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-a4d27d43f9] Jul 2 07:56:23.777399 waagent[1530]: 2024-07-02T07:56:23.777225Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-a4d27d43f9] Jul 2 07:56:23.781355 waagent[1530]: 2024-07-02T07:56:23.781245Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 07:56:23.784547 waagent[1530]: 2024-07-02T07:56:23.784459Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 07:56:23.799711 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 07:56:23.799978 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 07:56:23.800061 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 07:56:23.800415 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:56:23.805719 systemd-networkd[1192]: eth0: DHCPv6 lease lost Jul 2 07:56:23.807369 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:56:23.807599 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:56:23.810466 systemd[1]: Starting systemd-networkd.service... Jul 2 07:56:23.844371 systemd-networkd[1582]: enP29478s1: Link UP Jul 2 07:56:23.844384 systemd-networkd[1582]: enP29478s1: Gained carrier Jul 2 07:56:23.845992 systemd-networkd[1582]: eth0: Link UP Jul 2 07:56:23.846001 systemd-networkd[1582]: eth0: Gained carrier Jul 2 07:56:23.846454 systemd-networkd[1582]: lo: Link UP Jul 2 07:56:23.846463 systemd-networkd[1582]: lo: Gained carrier Jul 2 07:56:23.846814 systemd-networkd[1582]: eth0: Gained IPv6LL Jul 2 07:56:23.847114 systemd-networkd[1582]: Enumeration completed Jul 2 07:56:23.847256 systemd[1]: Started systemd-networkd.service. Jul 2 07:56:23.849511 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:56:23.853975 systemd-networkd[1582]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:56:23.855801 waagent[1530]: 2024-07-02T07:56:23.855569Z INFO Daemon Daemon Create user account if not exists Jul 2 07:56:23.858874 waagent[1530]: 2024-07-02T07:56:23.858788Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 07:56:23.861529 waagent[1530]: 2024-07-02T07:56:23.861450Z INFO Daemon Daemon Configure sudoer Jul 2 07:56:23.864021 waagent[1530]: 2024-07-02T07:56:23.863953Z INFO Daemon Daemon Configure sshd Jul 2 07:56:23.866210 waagent[1530]: 2024-07-02T07:56:23.866146Z INFO Daemon Daemon Deploy ssh public key. Jul 2 07:56:23.901769 systemd-networkd[1582]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Jul 2 07:56:23.906348 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:56:25.176173 waagent[1530]: 2024-07-02T07:56:25.176057Z INFO Daemon Daemon Provisioning complete Jul 2 07:56:25.190113 waagent[1530]: 2024-07-02T07:56:25.190022Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 07:56:25.196352 waagent[1530]: 2024-07-02T07:56:25.190805Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 07:56:25.196352 waagent[1530]: 2024-07-02T07:56:25.192396Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 07:56:25.469357 waagent[1593]: 2024-07-02T07:56:25.469159Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 07:56:25.470139 waagent[1593]: 2024-07-02T07:56:25.470063Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:25.470288 waagent[1593]: 2024-07-02T07:56:25.470234Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:25.481861 waagent[1593]: 2024-07-02T07:56:25.481767Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 07:56:25.482073 waagent[1593]: 2024-07-02T07:56:25.482014Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 07:56:25.547038 waagent[1593]: 2024-07-02T07:56:25.546880Z INFO ExtHandler ExtHandler Found private key matching thumbprint 01782FCA3BBDE33B9319589FD1DEC4EA13646439 Jul 2 07:56:25.547294 waagent[1593]: 2024-07-02T07:56:25.547227Z INFO ExtHandler ExtHandler Certificate with thumbprint 5BB4E11EB22389096BA18BC27696C0A5D567ABC6 has no matching private key. Jul 2 07:56:25.547531 waagent[1593]: 2024-07-02T07:56:25.547479Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 07:56:25.561999 waagent[1593]: 2024-07-02T07:56:25.561926Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 888be53f-7eee-41c5-a11d-503a092d3b6e New eTag: 13059380622627701782] Jul 2 07:56:25.562605 waagent[1593]: 2024-07-02T07:56:25.562543Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 07:56:25.699306 waagent[1593]: 2024-07-02T07:56:25.699117Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:56:25.709095 waagent[1593]: 2024-07-02T07:56:25.708989Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1593 Jul 2 07:56:25.712701 waagent[1593]: 2024-07-02T07:56:25.712606Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:56:25.713999 waagent[1593]: 2024-07-02T07:56:25.713935Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:56:25.740766 waagent[1593]: 2024-07-02T07:56:25.740608Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:56:25.741170 waagent[1593]: 2024-07-02T07:56:25.741092Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:56:25.750093 waagent[1593]: 2024-07-02T07:56:25.750025Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:56:25.750702 waagent[1593]: 2024-07-02T07:56:25.750589Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:56:25.751859 waagent[1593]: 2024-07-02T07:56:25.751792Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 07:56:25.753230 waagent[1593]: 2024-07-02T07:56:25.753168Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:56:25.753433 waagent[1593]: 2024-07-02T07:56:25.753377Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:25.753595 waagent[1593]: 2024-07-02T07:56:25.753547Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:25.754174 waagent[1593]: 2024-07-02T07:56:25.754118Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:56:25.754478 waagent[1593]: 2024-07-02T07:56:25.754423Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:56:25.754478 waagent[1593]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:56:25.754478 waagent[1593]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:56:25.754478 waagent[1593]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:56:25.754478 waagent[1593]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:25.754478 waagent[1593]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:25.754478 waagent[1593]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:25.758264 waagent[1593]: 2024-07-02T07:56:25.758111Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:56:25.758716 waagent[1593]: 2024-07-02T07:56:25.758654Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:25.758920 waagent[1593]: 2024-07-02T07:56:25.758867Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:25.759543 waagent[1593]: 2024-07-02T07:56:25.759481Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:56:25.759870 waagent[1593]: 2024-07-02T07:56:25.759638Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:56:25.759946 waagent[1593]: 2024-07-02T07:56:25.759842Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:56:25.760871 waagent[1593]: 2024-07-02T07:56:25.760813Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:56:25.761078 waagent[1593]: 2024-07-02T07:56:25.761021Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:56:25.761778 waagent[1593]: 2024-07-02T07:56:25.761715Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:56:25.761886 waagent[1593]: 2024-07-02T07:56:25.761825Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:56:25.762316 waagent[1593]: 2024-07-02T07:56:25.762263Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:56:25.774233 waagent[1593]: 2024-07-02T07:56:25.774162Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 07:56:25.775093 waagent[1593]: 2024-07-02T07:56:25.775033Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:56:25.776368 waagent[1593]: 2024-07-02T07:56:25.776303Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 07:56:25.818475 waagent[1593]: 2024-07-02T07:56:25.818390Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 07:56:25.928080 waagent[1593]: 2024-07-02T07:56:25.927939Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1582' Jul 2 07:56:26.031228 waagent[1593]: 2024-07-02T07:56:26.031071Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 07:56:26.196631 waagent[1530]: 2024-07-02T07:56:26.196424Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 07:56:26.202216 waagent[1530]: 2024-07-02T07:56:26.202130Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 07:56:27.276715 waagent[1622]: 2024-07-02T07:56:27.276582Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 07:56:27.307342 waagent[1622]: 2024-07-02T07:56:27.307198Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.307509Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.307699Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.319462Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.319951Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.320096Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:27.352098 waagent[1622]: 2024-07-02T07:56:27.332448Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 07:56:27.361078 waagent[1622]: 2024-07-02T07:56:27.361004Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 07:56:27.362144 waagent[1622]: 2024-07-02T07:56:27.362076Z INFO ExtHandler Jul 2 07:56:27.362303 waagent[1622]: 2024-07-02T07:56:27.362250Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 85346b6f-747e-4340-ad67-27c07d2c6453 eTag: 13059380622627701782 source: Fabric] Jul 2 07:56:27.363028 waagent[1622]: 2024-07-02T07:56:27.362966Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 07:56:27.364145 waagent[1622]: 2024-07-02T07:56:27.364083Z INFO ExtHandler Jul 2 07:56:27.364290 waagent[1622]: 2024-07-02T07:56:27.364231Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 07:56:27.371241 waagent[1622]: 2024-07-02T07:56:27.371176Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 07:56:27.371756 waagent[1622]: 2024-07-02T07:56:27.371702Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 07:56:27.391161 waagent[1622]: 2024-07-02T07:56:27.391066Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 07:56:27.459843 waagent[1622]: 2024-07-02T07:56:27.459690Z INFO ExtHandler Downloaded certificate {'thumbprint': '5BB4E11EB22389096BA18BC27696C0A5D567ABC6', 'hasPrivateKey': False} Jul 2 07:56:27.460935 waagent[1622]: 2024-07-02T07:56:27.460858Z INFO ExtHandler Downloaded certificate {'thumbprint': '01782FCA3BBDE33B9319589FD1DEC4EA13646439', 'hasPrivateKey': True} Jul 2 07:56:27.461992 waagent[1622]: 2024-07-02T07:56:27.461925Z INFO ExtHandler Fetch goal state completed Jul 2 07:56:27.483159 waagent[1622]: 2024-07-02T07:56:27.483033Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 07:56:27.495713 waagent[1622]: 2024-07-02T07:56:27.495580Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1622 Jul 2 07:56:27.499188 waagent[1622]: 2024-07-02T07:56:27.499100Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 07:56:27.500633 waagent[1622]: 2024-07-02T07:56:27.500565Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 07:56:27.506097 waagent[1622]: 2024-07-02T07:56:27.506038Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 07:56:27.506506 waagent[1622]: 2024-07-02T07:56:27.506447Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 07:56:27.515219 waagent[1622]: 2024-07-02T07:56:27.515156Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 07:56:27.515757 waagent[1622]: 2024-07-02T07:56:27.515695Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 07:56:27.522387 waagent[1622]: 2024-07-02T07:56:27.522286Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 07:56:27.523401 waagent[1622]: 2024-07-02T07:56:27.523334Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 07:56:27.525362 waagent[1622]: 2024-07-02T07:56:27.525299Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 07:56:27.525802 waagent[1622]: 2024-07-02T07:56:27.525744Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:27.525960 waagent[1622]: 2024-07-02T07:56:27.525910Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:27.526541 waagent[1622]: 2024-07-02T07:56:27.526481Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 07:56:27.526906 waagent[1622]: 2024-07-02T07:56:27.526811Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 07:56:27.526906 waagent[1622]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 07:56:27.526906 waagent[1622]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 07:56:27.526906 waagent[1622]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 07:56:27.526906 waagent[1622]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:27.526906 waagent[1622]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:27.526906 waagent[1622]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 07:56:27.529909 waagent[1622]: 2024-07-02T07:56:27.529737Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 07:56:27.530401 waagent[1622]: 2024-07-02T07:56:27.530330Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 07:56:27.530635 waagent[1622]: 2024-07-02T07:56:27.530563Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 07:56:27.531283 waagent[1622]: 2024-07-02T07:56:27.531226Z INFO EnvHandler ExtHandler Configure routes Jul 2 07:56:27.531444 waagent[1622]: 2024-07-02T07:56:27.531394Z INFO EnvHandler ExtHandler Gateway:None Jul 2 07:56:27.531589 waagent[1622]: 2024-07-02T07:56:27.531546Z INFO EnvHandler ExtHandler Routes:None Jul 2 07:56:27.535851 waagent[1622]: 2024-07-02T07:56:27.535767Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 07:56:27.536687 waagent[1622]: 2024-07-02T07:56:27.536157Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 07:56:27.543334 waagent[1622]: 2024-07-02T07:56:27.543246Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 07:56:27.547941 waagent[1622]: 2024-07-02T07:56:27.542829Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 07:56:27.547941 waagent[1622]: 2024-07-02T07:56:27.546042Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 07:56:27.559228 waagent[1622]: 2024-07-02T07:56:27.559140Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 07:56:27.559228 waagent[1622]: Executing ['ip', '-a', '-o', 'link']: Jul 2 07:56:27.559228 waagent[1622]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 07:56:27.559228 waagent[1622]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a0:72:98 brd ff:ff:ff:ff:ff:ff Jul 2 07:56:27.559228 waagent[1622]: 3: enP29478s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a0:72:98 brd ff:ff:ff:ff:ff:ff\ altname enP29478p0s2 Jul 2 07:56:27.559228 waagent[1622]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 07:56:27.559228 waagent[1622]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 07:56:27.559228 waagent[1622]: 2: eth0 inet 10.200.8.13/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 07:56:27.559228 waagent[1622]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 07:56:27.559228 waagent[1622]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 07:56:27.559228 waagent[1622]: 2: eth0 inet6 fe80::222:48ff:fea0:7298/64 scope link \ valid_lft forever preferred_lft forever Jul 2 07:56:27.560495 waagent[1622]: 2024-07-02T07:56:27.560436Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 07:56:27.587126 waagent[1622]: 2024-07-02T07:56:27.587032Z INFO ExtHandler ExtHandler Jul 2 07:56:27.589610 waagent[1622]: 2024-07-02T07:56:27.589546Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e2850623-7981-4ac2-b86a-972f6e452c4d correlation 6a490be6-c7ec-4a46-aecc-b08591cb2d41 created: 2024-07-02T07:55:40.734261Z] Jul 2 07:56:27.590798 waagent[1622]: 2024-07-02T07:56:27.590733Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 07:56:27.592727 waagent[1622]: 2024-07-02T07:56:27.592660Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Jul 2 07:56:27.613539 waagent[1622]: 2024-07-02T07:56:27.613459Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 07:56:27.650977 waagent[1622]: 2024-07-02T07:56:27.650883Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0B9B1E75-43DD-4DFF-9FC9-0E3009B38460;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 07:56:28.315405 waagent[1622]: 2024-07-02T07:56:28.315276Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 07:56:28.315405 waagent[1622]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.315405 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.315405 waagent[1622]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.315405 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.315405 waagent[1622]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.315405 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.315405 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:56:28.315405 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:56:28.315405 waagent[1622]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:56:28.323186 waagent[1622]: 2024-07-02T07:56:28.323077Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 07:56:28.323186 waagent[1622]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.323186 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.323186 waagent[1622]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.323186 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.323186 waagent[1622]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 07:56:28.323186 waagent[1622]: pkts bytes target prot opt in out source destination Jul 2 07:56:28.323186 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 07:56:28.323186 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 07:56:28.323186 waagent[1622]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 07:56:28.323812 waagent[1622]: 2024-07-02T07:56:28.323755Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 07:56:28.794117 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:56:28.794458 systemd[1]: Stopped kubelet.service. Jul 2 07:56:28.794530 systemd[1]: kubelet.service: Consumed 1.161s CPU time. Jul 2 07:56:28.796691 systemd[1]: Starting kubelet.service... Jul 2 07:56:29.195561 systemd[1]: Started kubelet.service. Jul 2 07:56:29.484554 kubelet[1677]: E0702 07:56:29.484421 1677 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:29.487969 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:29.488136 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:39.739363 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:56:39.739741 systemd[1]: Stopped kubelet.service. Jul 2 07:56:39.741959 systemd[1]: Starting kubelet.service... Jul 2 07:56:39.823989 systemd[1]: Started kubelet.service. Jul 2 07:56:40.355669 kubelet[1688]: E0702 07:56:40.355600 1688 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:40.357873 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:40.358041 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:50.386597 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 07:56:50.386948 systemd[1]: Stopped kubelet.service. Jul 2 07:56:50.389124 systemd[1]: Starting kubelet.service... Jul 2 07:56:51.807391 systemd[1]: Started kubelet.service. Jul 2 07:56:51.881463 kubelet[1698]: E0702 07:56:51.881395 1698 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:51.883564 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:51.883720 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:01.008463 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Jul 2 07:57:01.886502 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 07:57:01.886854 systemd[1]: Stopped kubelet.service. Jul 2 07:57:01.889043 systemd[1]: Starting kubelet.service... Jul 2 07:57:01.971552 systemd[1]: Started kubelet.service. Jul 2 07:57:02.025384 kubelet[1708]: E0702 07:57:02.025319 1708 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:57:02.027363 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:57:02.027524 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:02.618937 update_engine[1419]: I0702 07:57:02.618841 1419 update_attempter.cc:509] Updating boot flags... Jul 2 07:57:12.136427 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 07:57:12.136783 systemd[1]: Stopped kubelet.service. Jul 2 07:57:12.138976 systemd[1]: Starting kubelet.service... Jul 2 07:57:12.221389 systemd[1]: Started kubelet.service. Jul 2 07:57:12.742259 kubelet[1784]: E0702 07:57:12.742195 1784 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:57:12.744209 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:57:12.744324 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:17.868579 systemd[1]: Created slice system-sshd.slice. Jul 2 07:57:17.870545 systemd[1]: Started sshd@0-10.200.8.13:22-10.200.16.10:38108.service. Jul 2 07:57:18.558090 sshd[1795]: Accepted publickey for core from 10.200.16.10 port 38108 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:18.559884 sshd[1795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:18.565673 systemd[1]: Started session-3.scope. Jul 2 07:57:18.566288 systemd-logind[1418]: New session 3 of user core. Jul 2 07:57:19.119539 systemd[1]: Started sshd@1-10.200.8.13:22-10.200.16.10:40716.service. Jul 2 07:57:19.763494 sshd[1800]: Accepted publickey for core from 10.200.16.10 port 40716 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:19.765250 sshd[1800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:19.770991 systemd[1]: Started session-4.scope. Jul 2 07:57:19.771603 systemd-logind[1418]: New session 4 of user core. Jul 2 07:57:20.223954 sshd[1800]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:20.227374 systemd[1]: sshd@1-10.200.8.13:22-10.200.16.10:40716.service: Deactivated successfully. Jul 2 07:57:20.228446 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:57:20.229232 systemd-logind[1418]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:57:20.230187 systemd-logind[1418]: Removed session 4. Jul 2 07:57:20.332254 systemd[1]: Started sshd@2-10.200.8.13:22-10.200.16.10:40722.service. Jul 2 07:57:20.972494 sshd[1806]: Accepted publickey for core from 10.200.16.10 port 40722 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:20.974948 sshd[1806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:20.979900 systemd[1]: Started session-5.scope. Jul 2 07:57:20.980497 systemd-logind[1418]: New session 5 of user core. Jul 2 07:57:21.424787 sshd[1806]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:21.428171 systemd[1]: sshd@2-10.200.8.13:22-10.200.16.10:40722.service: Deactivated successfully. Jul 2 07:57:21.429222 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:57:21.430035 systemd-logind[1418]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:57:21.431006 systemd-logind[1418]: Removed session 5. Jul 2 07:57:21.533311 systemd[1]: Started sshd@3-10.200.8.13:22-10.200.16.10:40738.service. Jul 2 07:57:22.176859 sshd[1812]: Accepted publickey for core from 10.200.16.10 port 40738 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:22.178632 sshd[1812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:22.183869 systemd[1]: Started session-6.scope. Jul 2 07:57:22.184318 systemd-logind[1418]: New session 6 of user core. Jul 2 07:57:22.637447 sshd[1812]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:22.640603 systemd[1]: sshd@3-10.200.8.13:22-10.200.16.10:40738.service: Deactivated successfully. Jul 2 07:57:22.641495 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:57:22.642118 systemd-logind[1418]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:57:22.642903 systemd-logind[1418]: Removed session 6. Jul 2 07:57:22.753857 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 07:57:22.754045 systemd[1]: Stopped kubelet.service. Jul 2 07:57:22.755847 systemd[1]: Starting kubelet.service... Jul 2 07:57:22.757615 systemd[1]: Started sshd@4-10.200.8.13:22-10.200.16.10:40754.service. Jul 2 07:57:22.842283 systemd[1]: Started kubelet.service. Jul 2 07:57:22.889719 kubelet[1824]: E0702 07:57:22.889585 1824 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:57:22.891835 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:57:22.892004 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:23.400335 sshd[1819]: Accepted publickey for core from 10.200.16.10 port 40754 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:23.402057 sshd[1819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:23.407340 systemd[1]: Started session-7.scope. Jul 2 07:57:23.407808 systemd-logind[1418]: New session 7 of user core. Jul 2 07:57:24.509504 sudo[1832]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:57:24.509914 sudo[1832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:57:24.522872 dbus-daemon[1408]: \xd0\xdd\u0005\xd5uU: received setenforce notice (enforcing=-1752543536) Jul 2 07:57:24.524802 sudo[1832]: pam_unix(sudo:session): session closed for user root Jul 2 07:57:24.633068 sshd[1819]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:24.637041 systemd[1]: sshd@4-10.200.8.13:22-10.200.16.10:40754.service: Deactivated successfully. Jul 2 07:57:24.638156 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:57:24.638868 systemd-logind[1418]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:57:24.639736 systemd-logind[1418]: Removed session 7. Jul 2 07:57:24.742101 systemd[1]: Started sshd@5-10.200.8.13:22-10.200.16.10:40758.service. Jul 2 07:57:25.386324 sshd[1836]: Accepted publickey for core from 10.200.16.10 port 40758 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:25.388168 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:25.393751 systemd-logind[1418]: New session 8 of user core. Jul 2 07:57:25.394195 systemd[1]: Started session-8.scope. Jul 2 07:57:25.746952 sudo[1840]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:57:25.747240 sudo[1840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:57:25.750202 sudo[1840]: pam_unix(sudo:session): session closed for user root Jul 2 07:57:25.755081 sudo[1839]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:57:25.755374 sudo[1839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:57:25.764724 systemd[1]: Stopping audit-rules.service... Jul 2 07:57:25.773695 kernel: kauditd_printk_skb: 117 callbacks suppressed Jul 2 07:57:25.773783 kernel: audit: type=1305 audit(1719907045.764:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:57:25.764000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:57:25.773876 auditctl[1843]: No rules Jul 2 07:57:25.766907 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:57:25.767067 systemd[1]: Stopped audit-rules.service. Jul 2 07:57:25.768736 systemd[1]: Starting audit-rules.service... Jul 2 07:57:25.764000 audit[1843]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3f68d230 a2=420 a3=0 items=0 ppid=1 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.788004 kernel: audit: type=1300 audit(1719907045.764:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3f68d230 a2=420 a3=0 items=0 ppid=1 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.792026 kernel: audit: type=1327 audit(1719907045.764:198): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:57:25.764000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:57:25.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.795357 augenrules[1860]: No rules Jul 2 07:57:25.796534 systemd[1]: Finished audit-rules.service. Jul 2 07:57:25.799049 sudo[1839]: pam_unix(sudo:session): session closed for user root Jul 2 07:57:25.801069 kernel: audit: type=1131 audit(1719907045.764:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.801135 kernel: audit: type=1130 audit(1719907045.791:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.796000 audit[1839]: USER_END pid=1839 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.820453 kernel: audit: type=1106 audit(1719907045.796:201): pid=1839 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.824679 kernel: audit: type=1104 audit(1719907045.796:202): pid=1839 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.796000 audit[1839]: CRED_DISP pid=1839 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.903156 sshd[1836]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:25.903000 audit[1836]: USER_END pid=1836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:25.906627 systemd[1]: sshd@5-10.200.8.13:22-10.200.16.10:40758.service: Deactivated successfully. Jul 2 07:57:25.907533 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:57:25.908864 systemd-logind[1418]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:57:25.909944 systemd-logind[1418]: Removed session 8. Jul 2 07:57:25.903000 audit[1836]: CRED_DISP pid=1836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:25.929991 kernel: audit: type=1106 audit(1719907045.903:203): pid=1836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:25.930119 kernel: audit: type=1104 audit(1719907045.903:204): pid=1836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:25.930145 kernel: audit: type=1131 audit(1719907045.905:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.16.10:40758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:25.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.16.10:40758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:26.012212 systemd[1]: Started sshd@6-10.200.8.13:22-10.200.16.10:40772.service. Jul 2 07:57:26.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.16.10:40772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:26.659000 audit[1866]: USER_ACCT pid=1866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:26.661579 sshd[1866]: Accepted publickey for core from 10.200.16.10 port 40772 ssh2: RSA SHA256:rMFzF1f+VHcPwzXfxcw29Fm3hFOpXl45tnQNe1IK4iE Jul 2 07:57:26.661000 audit[1866]: CRED_ACQ pid=1866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:26.661000 audit[1866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaf5aa500 a2=3 a3=0 items=0 ppid=1 pid=1866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:57:26.663266 sshd[1866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:26.668139 systemd[1]: Started session-9.scope. Jul 2 07:57:26.668767 systemd-logind[1418]: New session 9 of user core. Jul 2 07:57:26.671000 audit[1866]: USER_START pid=1866 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:26.673000 audit[1868]: CRED_ACQ pid=1868 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:27.016000 audit[1869]: USER_ACCT pid=1869 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:27.016000 audit[1869]: CRED_REFR pid=1869 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:27.017920 sudo[1869]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:57:27.018304 sudo[1869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:57:27.018000 audit[1869]: USER_START pid=1869 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:27.035875 systemd[1]: Starting coreos-metadata.service... Jul 2 07:57:27.079545 coreos-metadata[1873]: Jul 02 07:57:27.079 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 07:57:27.081807 coreos-metadata[1873]: Jul 02 07:57:27.081 INFO Fetch successful Jul 2 07:57:27.082050 coreos-metadata[1873]: Jul 02 07:57:27.082 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Jul 2 07:57:27.083477 coreos-metadata[1873]: Jul 02 07:57:27.083 INFO Fetch successful Jul 2 07:57:27.083979 coreos-metadata[1873]: Jul 02 07:57:27.083 INFO Fetching http://168.63.129.16/machine/c468a47d-a943-4d1f-8da9-f971c056ac88/4c4549f5%2Dc457%2D4fcf%2Daf8d%2Dd866a8fadffb.%5Fci%2D3510.3.5%2Da%2Da4d27d43f9?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Jul 2 07:57:27.085473 coreos-metadata[1873]: Jul 02 07:57:27.085 INFO Fetch successful Jul 2 07:57:27.119283 coreos-metadata[1873]: Jul 02 07:57:27.119 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Jul 2 07:57:27.131072 coreos-metadata[1873]: Jul 02 07:57:27.131 INFO Fetch successful Jul 2 07:57:27.140223 systemd[1]: Finished coreos-metadata.service. Jul 2 07:57:27.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:28.360564 systemd[1]: Stopped kubelet.service. Jul 2 07:57:28.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:28.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:28.364002 systemd[1]: Starting kubelet.service... Jul 2 07:57:28.396037 systemd[1]: Reloading. Jul 2 07:57:28.511287 /usr/lib/systemd/system-generators/torcx-generator[1930]: time="2024-07-02T07:57:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:28.511329 /usr/lib/systemd/system-generators/torcx-generator[1930]: time="2024-07-02T07:57:28Z" level=info msg="torcx already run" Jul 2 07:57:28.605938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:28.605958 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:28.622612 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.692000 audit: BPF prog-id=41 op=LOAD Jul 2 07:57:28.692000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.695000 audit: BPF prog-id=42 op=LOAD Jul 2 07:57:28.695000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit: BPF prog-id=43 op=LOAD Jul 2 07:57:28.697000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit: BPF prog-id=44 op=LOAD Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.697000 audit: BPF prog-id=45 op=LOAD Jul 2 07:57:28.697000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:57:28.697000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit: BPF prog-id=46 op=LOAD Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.699000 audit: BPF prog-id=47 op=LOAD Jul 2 07:57:28.699000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:57:28.699000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.701000 audit: BPF prog-id=48 op=LOAD Jul 2 07:57:28.701000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit: BPF prog-id=49 op=LOAD Jul 2 07:57:28.702000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit: BPF prog-id=50 op=LOAD Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.702000 audit: BPF prog-id=51 op=LOAD Jul 2 07:57:28.702000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:57:28.703000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit: BPF prog-id=52 op=LOAD Jul 2 07:57:28.704000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit: BPF prog-id=53 op=LOAD Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.704000 audit: BPF prog-id=54 op=LOAD Jul 2 07:57:28.704000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:57:28.704000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:28.706000 audit: BPF prog-id=55 op=LOAD Jul 2 07:57:28.706000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:57:28.725508 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:57:28.725601 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:57:28.725913 systemd[1]: Stopped kubelet.service. Jul 2 07:57:28.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:57:28.727948 systemd[1]: Starting kubelet.service... Jul 2 07:57:34.355701 systemd[1]: Started kubelet.service. Jul 2 07:57:34.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:34.360019 kernel: kauditd_printk_skb: 187 callbacks suppressed Jul 2 07:57:34.360107 kernel: audit: type=1130 audit(1719907054.354:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:34.416832 kubelet[1999]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:34.416832 kubelet[1999]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:57:34.416832 kubelet[1999]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:34.417384 kubelet[1999]: I0702 07:57:34.416909 1999 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:57:35.096140 kubelet[1999]: I0702 07:57:35.096097 1999 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 07:57:35.096140 kubelet[1999]: I0702 07:57:35.096128 1999 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:57:35.096425 kubelet[1999]: I0702 07:57:35.096403 1999 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 07:57:35.122155 kubelet[1999]: I0702 07:57:35.121467 1999 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:57:35.131202 kubelet[1999]: I0702 07:57:35.131166 1999 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:57:35.131466 kubelet[1999]: I0702 07:57:35.131446 1999 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:57:35.131672 kubelet[1999]: I0702 07:57:35.131641 1999 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:57:35.131833 kubelet[1999]: I0702 07:57:35.131688 1999 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:57:35.131833 kubelet[1999]: I0702 07:57:35.131703 1999 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:57:35.131912 kubelet[1999]: I0702 07:57:35.131837 1999 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:35.131996 kubelet[1999]: I0702 07:57:35.131979 1999 kubelet.go:396] "Attempting to sync node with API server" Jul 2 07:57:35.132042 kubelet[1999]: I0702 07:57:35.132005 1999 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:57:35.132242 kubelet[1999]: I0702 07:57:35.132225 1999 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:57:35.132305 kubelet[1999]: I0702 07:57:35.132251 1999 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:57:35.134723 kubelet[1999]: E0702 07:57:35.134701 1999 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:35.134894 kubelet[1999]: E0702 07:57:35.134883 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:35.135911 kubelet[1999]: I0702 07:57:35.135892 1999 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:57:35.139054 kubelet[1999]: I0702 07:57:35.139031 1999 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:57:35.140959 kubelet[1999]: W0702 07:57:35.140933 1999 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:57:35.141587 kubelet[1999]: I0702 07:57:35.141566 1999 server.go:1256] "Started kubelet" Jul 2 07:57:35.142599 kubelet[1999]: W0702 07:57:35.142579 1999 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:57:35.142728 kubelet[1999]: E0702 07:57:35.142717 1999 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:57:35.142876 kubelet[1999]: W0702 07:57:35.142864 1999 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:57:35.142951 kubelet[1999]: E0702 07:57:35.142943 1999 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:57:35.143548 kubelet[1999]: I0702 07:57:35.143531 1999 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:57:35.154220 kubelet[1999]: I0702 07:57:35.153670 1999 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:57:35.154220 kubelet[1999]: I0702 07:57:35.154020 1999 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:57:35.155169 kubelet[1999]: I0702 07:57:35.155149 1999 server.go:461] "Adding debug handlers to kubelet server" Jul 2 07:57:35.154000 audit[1999]: AVC avc: denied { mac_admin } for pid=1999 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:35.164668 kernel: audit: type=1400 audit(1719907055.154:392): avc: denied { mac_admin } for pid=1999 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:35.154000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.166225 1999 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.166280 1999 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.166374 1999 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.169481 1999 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.169955 1999 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:57:35.171161 kubelet[1999]: I0702 07:57:35.170020 1999 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:57:35.154000 audit[1999]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c800f0 a1=c000971818 a2=c000c800c0 a3=25 items=0 ppid=1 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.186007 kernel: audit: type=1401 audit(1719907055.154:392): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:35.186104 kernel: audit: type=1300 audit(1719907055.154:392): arch=c000003e syscall=188 success=no exit=-22 a0=c000c800f0 a1=c000971818 a2=c000c800c0 a3=25 items=0 ppid=1 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.154000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:35.214965 kernel: audit: type=1327 audit(1719907055.154:392): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:35.215177 kernel: audit: type=1400 audit(1719907055.165:393): avc: denied { mac_admin } for pid=1999 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:35.165000 audit[1999]: AVC avc: denied { mac_admin } for pid=1999 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:35.165000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:35.222685 kernel: audit: type=1401 audit(1719907055.165:393): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:35.165000 audit[1999]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b671e0 a1=c0009718d8 a2=c000c80270 a3=25 items=0 ppid=1 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.236187 kubelet[1999]: I0702 07:57:35.236152 1999 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:57:35.236511 kubelet[1999]: I0702 07:57:35.236482 1999 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:57:35.243681 kernel: audit: type=1300 audit(1719907055.165:393): arch=c000003e syscall=188 success=no exit=-22 a0=c000b671e0 a1=c0009718d8 a2=c000c80270 a3=25 items=0 ppid=1 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.244849 kubelet[1999]: E0702 07:57:35.244812 1999 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.13\" not found" node="10.200.8.13" Jul 2 07:57:35.246816 kubelet[1999]: I0702 07:57:35.246787 1999 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:57:35.165000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:35.252589 kubelet[1999]: I0702 07:57:35.252564 1999 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:57:35.254054 kubelet[1999]: I0702 07:57:35.254035 1999 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:57:35.254156 kubelet[1999]: I0702 07:57:35.254147 1999 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:57:35.254215 kubelet[1999]: I0702 07:57:35.254209 1999 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 07:57:35.254379 kubelet[1999]: E0702 07:57:35.254370 1999 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:57:35.263022 kubelet[1999]: E0702 07:57:35.262996 1999 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:57:35.172000 audit[2009]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.273563 kubelet[1999]: I0702 07:57:35.273533 1999 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.13" Jul 2 07:57:35.274817 kubelet[1999]: I0702 07:57:35.274786 1999 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:57:35.274939 kernel: audit: type=1327 audit(1719907055.165:393): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:35.275022 kernel: audit: type=1325 audit(1719907055.172:394): table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.275087 kubelet[1999]: I0702 07:57:35.275074 1999 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:57:35.275195 kubelet[1999]: I0702 07:57:35.275184 1999 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:35.172000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6c8cc640 a2=0 a3=7ffd6c8cc62c items=0 ppid=1999 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:57:35.173000 audit[2010]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.173000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc671e74c0 a2=0 a3=7ffc671e74ac items=0 ppid=1999 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:57:35.175000 audit[2012]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.175000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff820f8610 a2=0 a3=7fff820f85fc items=0 ppid=1999 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:35.177000 audit[2014]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.177000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8b371740 a2=0 a3=7fff8b37172c items=0 ppid=1999 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:35.246000 audit[2018]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.246000 audit[2018]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff8995ccf0 a2=0 a3=7fff8995ccdc items=0 ppid=1999 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:57:35.252000 audit[2019]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:35.252000 audit[2019]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed413b180 a2=0 a3=7ffed413b16c items=0 ppid=1999 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:57:35.252000 audit[2020]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.252000 audit[2020]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe33f1fac0 a2=0 a3=7ffe33f1faac items=0 ppid=1999 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:57:35.252000 audit[2021]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.252000 audit[2021]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc9a291690 a2=0 a3=7ffc9a29167c items=0 ppid=1999 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:57:35.252000 audit[2022]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:35.252000 audit[2022]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc603ac2d0 a2=0 a3=7ffc603ac2bc items=0 ppid=1999 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:57:35.257000 audit[2023]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:35.257000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb65b7800 a2=0 a3=7fffb65b77ec items=0 ppid=1999 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:57:35.257000 audit[2024]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:35.257000 audit[2024]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffbd8b3a80 a2=0 a3=7fffbd8b3a6c items=0 ppid=1999 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:57:35.257000 audit[2025]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:35.257000 audit[2025]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd1e97b50 a2=0 a3=7ffdd1e97b3c items=0 ppid=1999 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:57:35.298695 kubelet[1999]: I0702 07:57:35.277350 1999 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.13" Jul 2 07:57:35.299431 kubelet[1999]: I0702 07:57:35.299405 1999 policy_none.go:49] "None policy: Start" Jul 2 07:57:35.300312 kubelet[1999]: I0702 07:57:35.300287 1999 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:57:35.300418 kubelet[1999]: I0702 07:57:35.300338 1999 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:57:35.312213 systemd[1]: Created slice kubepods.slice. Jul 2 07:57:35.316603 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:57:35.319812 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:57:35.328723 kubelet[1999]: I0702 07:57:35.328589 1999 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:57:35.328000 audit[1999]: AVC avc: denied { mac_admin } for pid=1999 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:35.328000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:35.328000 audit[1999]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c387b0 a1=c000c29290 a2=c000c38780 a3=25 items=0 ppid=1 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:35.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:35.329259 kubelet[1999]: I0702 07:57:35.329241 1999 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:57:35.329688 kubelet[1999]: I0702 07:57:35.329671 1999 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:57:35.332778 kubelet[1999]: E0702 07:57:35.332757 1999 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.13\" not found" Jul 2 07:57:35.334451 kubelet[1999]: E0702 07:57:35.334423 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.434995 kubelet[1999]: E0702 07:57:35.434928 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.535601 kubelet[1999]: E0702 07:57:35.535531 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.636506 kubelet[1999]: E0702 07:57:35.636437 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.737343 kubelet[1999]: E0702 07:57:35.737201 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.838092 kubelet[1999]: E0702 07:57:35.838032 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.878114 sudo[1869]: pam_unix(sudo:session): session closed for user root Jul 2 07:57:35.877000 audit[1869]: USER_END pid=1869 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.877000 audit[1869]: CRED_DISP pid=1869 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.938902 kubelet[1999]: E0702 07:57:35.938838 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:35.981724 sshd[1866]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:35.982000 audit[1866]: USER_END pid=1866 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:35.982000 audit[1866]: CRED_DISP pid=1866 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 07:57:35.985179 systemd[1]: sshd@6-10.200.8.13:22-10.200.16.10:40772.service: Deactivated successfully. Jul 2 07:57:35.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.16.10:40772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.986155 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:57:35.986903 systemd-logind[1418]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:57:35.987796 systemd-logind[1418]: Removed session 9. Jul 2 07:57:36.039584 kubelet[1999]: E0702 07:57:36.039522 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.104253 kubelet[1999]: I0702 07:57:36.104193 1999 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 07:57:36.104497 kubelet[1999]: W0702 07:57:36.104470 1999 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 07:57:36.104578 kubelet[1999]: W0702 07:57:36.104533 1999 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 07:57:36.135793 kubelet[1999]: E0702 07:57:36.135732 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:36.139878 kubelet[1999]: E0702 07:57:36.139843 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.240786 kubelet[1999]: E0702 07:57:36.240627 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.341298 kubelet[1999]: E0702 07:57:36.341241 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.442176 kubelet[1999]: E0702 07:57:36.442127 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.542949 kubelet[1999]: E0702 07:57:36.542808 1999 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Jul 2 07:57:36.644046 kubelet[1999]: I0702 07:57:36.644006 1999 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 07:57:36.644532 env[1426]: time="2024-07-02T07:57:36.644478821Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:57:36.645071 kubelet[1999]: I0702 07:57:36.644754 1999 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 07:57:37.136707 kubelet[1999]: E0702 07:57:37.136629 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:37.136707 kubelet[1999]: I0702 07:57:37.136630 1999 apiserver.go:52] "Watching apiserver" Jul 2 07:57:37.141919 kubelet[1999]: I0702 07:57:37.141885 1999 topology_manager.go:215] "Topology Admit Handler" podUID="3719d727-cc31-460e-a25d-bd223b2adea6" podNamespace="calico-system" podName="calico-node-tzb9p" Jul 2 07:57:37.142091 kubelet[1999]: I0702 07:57:37.142014 1999 topology_manager.go:215] "Topology Admit Handler" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" podNamespace="calico-system" podName="csi-node-driver-fcpmm" Jul 2 07:57:37.142091 kubelet[1999]: I0702 07:57:37.142076 1999 topology_manager.go:215] "Topology Admit Handler" podUID="579cc041-2063-4ffd-9ce3-a14735d24861" podNamespace="kube-system" podName="kube-proxy-jfrwt" Jul 2 07:57:37.142623 kubelet[1999]: E0702 07:57:37.142526 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:37.148159 systemd[1]: Created slice kubepods-besteffort-pod579cc041_2063_4ffd_9ce3_a14735d24861.slice. Jul 2 07:57:37.159345 systemd[1]: Created slice kubepods-besteffort-pod3719d727_cc31_460e_a25d_bd223b2adea6.slice. Jul 2 07:57:37.170356 kubelet[1999]: I0702 07:57:37.170324 1999 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:57:37.183629 kubelet[1999]: I0702 07:57:37.183584 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-lib-modules\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.183629 kubelet[1999]: I0702 07:57:37.183632 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3719d727-cc31-460e-a25d-bd223b2adea6-node-certs\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.183854 kubelet[1999]: I0702 07:57:37.183687 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-cni-net-dir\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.183854 kubelet[1999]: I0702 07:57:37.183714 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-var-run-calico\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.183854 kubelet[1999]: I0702 07:57:37.183742 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4mskm\" (UniqueName: \"kubernetes.io/projected/3719d727-cc31-460e-a25d-bd223b2adea6-kube-api-access-4mskm\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.183854 kubelet[1999]: I0702 07:57:37.183767 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a2b74567-ff4c-415f-9bbd-3c8a913fb76e-varrun\") pod \"csi-node-driver-fcpmm\" (UID: \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\") " pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:37.183854 kubelet[1999]: I0702 07:57:37.183793 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/579cc041-2063-4ffd-9ce3-a14735d24861-lib-modules\") pod \"kube-proxy-jfrwt\" (UID: \"579cc041-2063-4ffd-9ce3-a14735d24861\") " pod="kube-system/kube-proxy-jfrwt" Jul 2 07:57:37.184051 kubelet[1999]: I0702 07:57:37.183819 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9ll29\" (UniqueName: \"kubernetes.io/projected/579cc041-2063-4ffd-9ce3-a14735d24861-kube-api-access-9ll29\") pod \"kube-proxy-jfrwt\" (UID: \"579cc041-2063-4ffd-9ce3-a14735d24861\") " pod="kube-system/kube-proxy-jfrwt" Jul 2 07:57:37.184051 kubelet[1999]: I0702 07:57:37.183879 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-policysync\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184051 kubelet[1999]: I0702 07:57:37.183914 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3719d727-cc31-460e-a25d-bd223b2adea6-tigera-ca-bundle\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184051 kubelet[1999]: I0702 07:57:37.183944 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-var-lib-calico\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184051 kubelet[1999]: I0702 07:57:37.183972 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-flexvol-driver-host\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184246 kubelet[1999]: I0702 07:57:37.183999 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a2b74567-ff4c-415f-9bbd-3c8a913fb76e-registration-dir\") pod \"csi-node-driver-fcpmm\" (UID: \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\") " pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:37.184246 kubelet[1999]: I0702 07:57:37.184028 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xc824\" (UniqueName: \"kubernetes.io/projected/a2b74567-ff4c-415f-9bbd-3c8a913fb76e-kube-api-access-xc824\") pod \"csi-node-driver-fcpmm\" (UID: \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\") " pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:37.184246 kubelet[1999]: I0702 07:57:37.184056 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/579cc041-2063-4ffd-9ce3-a14735d24861-xtables-lock\") pod \"kube-proxy-jfrwt\" (UID: \"579cc041-2063-4ffd-9ce3-a14735d24861\") " pod="kube-system/kube-proxy-jfrwt" Jul 2 07:57:37.184246 kubelet[1999]: I0702 07:57:37.184084 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-xtables-lock\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184246 kubelet[1999]: I0702 07:57:37.184116 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-cni-bin-dir\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184430 kubelet[1999]: I0702 07:57:37.184145 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3719d727-cc31-460e-a25d-bd223b2adea6-cni-log-dir\") pod \"calico-node-tzb9p\" (UID: \"3719d727-cc31-460e-a25d-bd223b2adea6\") " pod="calico-system/calico-node-tzb9p" Jul 2 07:57:37.184430 kubelet[1999]: I0702 07:57:37.184182 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a2b74567-ff4c-415f-9bbd-3c8a913fb76e-kubelet-dir\") pod \"csi-node-driver-fcpmm\" (UID: \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\") " pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:37.184430 kubelet[1999]: I0702 07:57:37.184214 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a2b74567-ff4c-415f-9bbd-3c8a913fb76e-socket-dir\") pod \"csi-node-driver-fcpmm\" (UID: \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\") " pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:37.184430 kubelet[1999]: I0702 07:57:37.184243 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/579cc041-2063-4ffd-9ce3-a14735d24861-kube-proxy\") pod \"kube-proxy-jfrwt\" (UID: \"579cc041-2063-4ffd-9ce3-a14735d24861\") " pod="kube-system/kube-proxy-jfrwt" Jul 2 07:57:37.287624 kubelet[1999]: E0702 07:57:37.287585 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.287895 kubelet[1999]: W0702 07:57:37.287873 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.288032 kubelet[1999]: E0702 07:57:37.288015 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.288357 kubelet[1999]: E0702 07:57:37.288341 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.288477 kubelet[1999]: W0702 07:57:37.288465 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.288575 kubelet[1999]: E0702 07:57:37.288565 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.288867 kubelet[1999]: E0702 07:57:37.288854 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.288977 kubelet[1999]: W0702 07:57:37.288965 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.289056 kubelet[1999]: E0702 07:57:37.289046 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.289332 kubelet[1999]: E0702 07:57:37.289320 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.289832 kubelet[1999]: W0702 07:57:37.289816 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.289972 kubelet[1999]: E0702 07:57:37.289960 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.290312 kubelet[1999]: E0702 07:57:37.290298 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.290416 kubelet[1999]: W0702 07:57:37.290403 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.290505 kubelet[1999]: E0702 07:57:37.290493 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.290819 kubelet[1999]: E0702 07:57:37.290806 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.290914 kubelet[1999]: W0702 07:57:37.290902 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.291014 kubelet[1999]: E0702 07:57:37.291003 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.291304 kubelet[1999]: E0702 07:57:37.291292 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.291417 kubelet[1999]: W0702 07:57:37.291402 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.291512 kubelet[1999]: E0702 07:57:37.291503 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.292398 kubelet[1999]: E0702 07:57:37.292383 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.292509 kubelet[1999]: W0702 07:57:37.292498 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.292597 kubelet[1999]: E0702 07:57:37.292587 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.300881 kubelet[1999]: E0702 07:57:37.300861 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.301028 kubelet[1999]: W0702 07:57:37.301012 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.301130 kubelet[1999]: E0702 07:57:37.301120 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.301491 kubelet[1999]: E0702 07:57:37.301477 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.301595 kubelet[1999]: W0702 07:57:37.301582 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.301683 kubelet[1999]: E0702 07:57:37.301674 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.301998 kubelet[1999]: E0702 07:57:37.301987 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.302095 kubelet[1999]: W0702 07:57:37.302085 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.302173 kubelet[1999]: E0702 07:57:37.302165 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.302423 kubelet[1999]: E0702 07:57:37.302413 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.302511 kubelet[1999]: W0702 07:57:37.302501 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.302667 kubelet[1999]: E0702 07:57:37.302617 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.303056 kubelet[1999]: E0702 07:57:37.303043 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.303160 kubelet[1999]: W0702 07:57:37.303148 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.303249 kubelet[1999]: E0702 07:57:37.303239 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.303550 kubelet[1999]: E0702 07:57:37.303538 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.303668 kubelet[1999]: W0702 07:57:37.303639 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.303770 kubelet[1999]: E0702 07:57:37.303760 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.304330 kubelet[1999]: E0702 07:57:37.304308 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.304440 kubelet[1999]: W0702 07:57:37.304425 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.304542 kubelet[1999]: E0702 07:57:37.304532 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.304853 kubelet[1999]: E0702 07:57:37.304838 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.304965 kubelet[1999]: W0702 07:57:37.304951 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.305062 kubelet[1999]: E0702 07:57:37.305051 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.305378 kubelet[1999]: E0702 07:57:37.305363 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.305491 kubelet[1999]: W0702 07:57:37.305477 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.305590 kubelet[1999]: E0702 07:57:37.305580 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.305889 kubelet[1999]: E0702 07:57:37.305878 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.305988 kubelet[1999]: W0702 07:57:37.305977 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.306066 kubelet[1999]: E0702 07:57:37.306057 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.306377 kubelet[1999]: E0702 07:57:37.306363 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.306487 kubelet[1999]: W0702 07:57:37.306475 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.306588 kubelet[1999]: E0702 07:57:37.306578 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.313274 kubelet[1999]: E0702 07:57:37.313257 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.313413 kubelet[1999]: W0702 07:57:37.313397 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.313522 kubelet[1999]: E0702 07:57:37.313512 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.319326 kubelet[1999]: E0702 07:57:37.319177 1999 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:37.319326 kubelet[1999]: W0702 07:57:37.319194 1999 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:37.319326 kubelet[1999]: E0702 07:57:37.319233 1999 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:37.457007 env[1426]: time="2024-07-02T07:57:37.456852223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jfrwt,Uid:579cc041-2063-4ffd-9ce3-a14735d24861,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:37.952621 env[1426]: time="2024-07-02T07:57:37.952567254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tzb9p,Uid:3719d727-cc31-460e-a25d-bd223b2adea6,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:38.136965 kubelet[1999]: E0702 07:57:38.136898 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:39.137595 kubelet[1999]: E0702 07:57:39.137536 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:39.255329 kubelet[1999]: E0702 07:57:39.254880 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:40.138833 kubelet[1999]: E0702 07:57:40.138748 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:40.974883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2531589644.mount: Deactivated successfully. Jul 2 07:57:41.139560 kubelet[1999]: E0702 07:57:41.139511 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:41.210575 env[1426]: time="2024-07-02T07:57:41.210502069Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.255971 kubelet[1999]: E0702 07:57:41.255200 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:41.260547 env[1426]: time="2024-07-02T07:57:41.260466052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.356410 env[1426]: time="2024-07-02T07:57:41.356351184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.404401 env[1426]: time="2024-07-02T07:57:41.404339555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.452141 env[1426]: time="2024-07-02T07:57:41.452091301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.505215 env[1426]: time="2024-07-02T07:57:41.505089611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.862284 env[1426]: time="2024-07-02T07:57:41.862229194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:41.909934 env[1426]: time="2024-07-02T07:57:41.909863427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:42.139857 kubelet[1999]: E0702 07:57:42.139809 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:42.318658 env[1426]: time="2024-07-02T07:57:42.318554216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:42.318658 env[1426]: time="2024-07-02T07:57:42.318609922Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:42.319155 env[1426]: time="2024-07-02T07:57:42.318624124Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:42.319155 env[1426]: time="2024-07-02T07:57:42.318839546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c pid=2066 runtime=io.containerd.runc.v2 Jul 2 07:57:42.336100 systemd[1]: Started cri-containerd-6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c.scope. Jul 2 07:57:42.343397 systemd[1]: run-containerd-runc-k8s.io-6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c-runc.DULUPE.mount: Deactivated successfully. Jul 2 07:57:42.382228 kernel: kauditd_printk_skb: 44 callbacks suppressed Jul 2 07:57:42.382393 kernel: audit: type=1400 audit(1719907062.363:412): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.382570 env[1426]: time="2024-07-02T07:57:42.378431706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:42.382570 env[1426]: time="2024-07-02T07:57:42.378512715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:42.382570 env[1426]: time="2024-07-02T07:57:42.378540918Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:42.382570 env[1426]: time="2024-07-02T07:57:42.378815847Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac7602346a02b16ac21bed1aeb9155100b1017a70a7e8aeaa07f171f56ffd6ea pid=2100 runtime=io.containerd.runc.v2 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.407068 kernel: audit: type=1400 audit(1719907062.363:413): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.407232 kernel: audit: type=1400 audit(1719907062.363:414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.419834 kernel: audit: type=1400 audit(1719907062.363:415): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.412479 systemd[1]: Started cri-containerd-ac7602346a02b16ac21bed1aeb9155100b1017a70a7e8aeaa07f171f56ffd6ea.scope. Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.433808 kernel: audit: type=1400 audit(1719907062.363:416): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.458825 kernel: audit: type=1400 audit(1719907062.363:417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.458873 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:57:42.467899 env[1426]: time="2024-07-02T07:57:42.467849799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tzb9p,Uid:3719d727-cc31-460e-a25d-bd223b2adea6,Namespace:calico-system,Attempt:0,} returns sandbox id \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\"" Jul 2 07:57:42.468189 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:57:42.468267 kernel: audit: backlog limit exceeded Jul 2 07:57:42.484606 kernel: audit: type=1400 audit(1719907062.363:418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.368000 audit: BPF prog-id=56 op=LOAD Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2066 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353061316664393639346366636435316237643166653632653736 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2066 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353061316664393639346366636435316237643166653632653736 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.381000 audit: BPF prog-id=57 op=LOAD Jul 2 07:57:42.381000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028ad80 items=0 ppid=2066 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353061316664393639346366636435316237643166653632653736 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.425000 audit: BPF prog-id=58 op=LOAD Jul 2 07:57:42.425000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028b078 items=0 ppid=2066 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353061316664393639346366636435316237643166653632653736 Jul 2 07:57:42.432000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:57:42.432000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.432000 audit: BPF prog-id=59 op=LOAD Jul 2 07:57:42.432000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028b488 items=0 ppid=2066 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353061316664393639346366636435316237643166653632653736 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.470000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.470000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003989c0 items=0 ppid=2100 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373630323334366130326231366163323162656431616562393135 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit: BPF prog-id=62 op=LOAD Jul 2 07:57:42.489000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000398a08 items=0 ppid=2100 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373630323334366130326231366163323162656431616562393135 Jul 2 07:57:42.489000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:57:42.489000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:42.489000 audit: BPF prog-id=63 op=LOAD Jul 2 07:57:42.489000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000398e18 items=0 ppid=2100 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373630323334366130326231366163323162656431616562393135 Jul 2 07:57:42.499192 env[1426]: time="2024-07-02T07:57:42.499139986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:57:42.506519 env[1426]: time="2024-07-02T07:57:42.506477657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jfrwt,Uid:579cc041-2063-4ffd-9ce3-a14735d24861,Namespace:kube-system,Attempt:0,} returns sandbox id \"ac7602346a02b16ac21bed1aeb9155100b1017a70a7e8aeaa07f171f56ffd6ea\"" Jul 2 07:57:43.140790 kubelet[1999]: E0702 07:57:43.140733 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:43.255733 kubelet[1999]: E0702 07:57:43.255157 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:44.141665 kubelet[1999]: E0702 07:57:44.141595 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:45.142170 kubelet[1999]: E0702 07:57:45.142107 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:45.256032 kubelet[1999]: E0702 07:57:45.255527 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:45.380672 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785119302.mount: Deactivated successfully. Jul 2 07:57:45.969388 env[1426]: time="2024-07-02T07:57:45.969319346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:46.011505 env[1426]: time="2024-07-02T07:57:46.011441329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:46.054823 env[1426]: time="2024-07-02T07:57:46.054760246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:46.106386 env[1426]: time="2024-07-02T07:57:46.106324446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:46.107148 env[1426]: time="2024-07-02T07:57:46.107096520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:57:46.109131 env[1426]: time="2024-07-02T07:57:46.109093009Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 07:57:46.110413 env[1426]: time="2024-07-02T07:57:46.110377931Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:57:46.142590 kubelet[1999]: E0702 07:57:46.142542 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:46.265521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2448973799.mount: Deactivated successfully. Jul 2 07:57:46.330437 env[1426]: time="2024-07-02T07:57:46.330379239Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64\"" Jul 2 07:57:46.331463 env[1426]: time="2024-07-02T07:57:46.331416638Z" level=info msg="StartContainer for \"541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64\"" Jul 2 07:57:46.353796 systemd[1]: Started cri-containerd-541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64.scope. Jul 2 07:57:46.359316 systemd[1]: run-containerd-runc-k8s.io-541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64-runc.CoZTah.mount: Deactivated successfully. Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3c55b0a138 items=0 ppid=2066 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:46.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316633386166633432313862663738316365303334613264353432 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.377000 audit: BPF prog-id=64 op=LOAD Jul 2 07:57:46.377000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000183be8 items=0 ppid=2066 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:46.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316633386166633432313862663738316365303334613264353432 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit: BPF prog-id=65 op=LOAD Jul 2 07:57:46.378000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183c38 items=0 ppid=2066 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:46.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316633386166633432313862663738316365303334613264353432 Jul 2 07:57:46.378000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:57:46.378000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:46.378000 audit: BPF prog-id=66 op=LOAD Jul 2 07:57:46.378000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000183cc8 items=0 ppid=2066 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:46.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316633386166633432313862663738316365303334613264353432 Jul 2 07:57:46.400383 env[1426]: time="2024-07-02T07:57:46.400327687Z" level=info msg="StartContainer for \"541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64\" returns successfully" Jul 2 07:57:46.408966 systemd[1]: cri-containerd-541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64.scope: Deactivated successfully. Jul 2 07:57:46.412000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:57:46.432193 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64-rootfs.mount: Deactivated successfully. Jul 2 07:57:46.620336 env[1426]: time="2024-07-02T07:57:46.618550426Z" level=info msg="shim disconnected" id=541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64 Jul 2 07:57:46.620336 env[1426]: time="2024-07-02T07:57:46.618595530Z" level=warning msg="cleaning up after shim disconnected" id=541f38afc4218bf781ce034a2d542e1f0f8cffb960feb54f643d7db479f1bf64 namespace=k8s.io Jul 2 07:57:46.620336 env[1426]: time="2024-07-02T07:57:46.618607631Z" level=info msg="cleaning up dead shim" Jul 2 07:57:46.627900 env[1426]: time="2024-07-02T07:57:46.627858210Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:57:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2189 runtime=io.containerd.runc.v2\n" Jul 2 07:57:47.143610 kubelet[1999]: E0702 07:57:47.143543 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:47.256973 kubelet[1999]: E0702 07:57:47.256941 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:47.579148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2704384591.mount: Deactivated successfully. Jul 2 07:57:48.144364 kubelet[1999]: E0702 07:57:48.144312 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:48.157829 env[1426]: time="2024-07-02T07:57:48.157771286Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.164379 env[1426]: time="2024-07-02T07:57:48.164330079Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.167306 env[1426]: time="2024-07-02T07:57:48.167266745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.170109 env[1426]: time="2024-07-02T07:57:48.170080100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.170468 env[1426]: time="2024-07-02T07:57:48.170436032Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9\"" Jul 2 07:57:48.172339 env[1426]: time="2024-07-02T07:57:48.171854960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:57:48.172604 env[1426]: time="2024-07-02T07:57:48.172575225Z" level=info msg="CreateContainer within sandbox \"ac7602346a02b16ac21bed1aeb9155100b1017a70a7e8aeaa07f171f56ffd6ea\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:57:48.195198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount461035321.mount: Deactivated successfully. Jul 2 07:57:48.208292 env[1426]: time="2024-07-02T07:57:48.208245553Z" level=info msg="CreateContainer within sandbox \"ac7602346a02b16ac21bed1aeb9155100b1017a70a7e8aeaa07f171f56ffd6ea\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c3bdfa81d110bb106111c4f4f4dcd1c4d086d6417cbbd0833190e1607fb1fc9a\"" Jul 2 07:57:48.208948 env[1426]: time="2024-07-02T07:57:48.208921314Z" level=info msg="StartContainer for \"c3bdfa81d110bb106111c4f4f4dcd1c4d086d6417cbbd0833190e1607fb1fc9a\"" Jul 2 07:57:48.229941 systemd[1]: Started cri-containerd-c3bdfa81d110bb106111c4f4f4dcd1c4d086d6417cbbd0833190e1607fb1fc9a.scope. Jul 2 07:57:48.265840 kernel: kauditd_printk_skb: 170 callbacks suppressed Jul 2 07:57:48.265987 kernel: audit: type=1400 audit(1719907068.248:452): avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.283953 kernel: audit: type=1300 audit(1719907068.248:452): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8795c467a8 items=0 ppid=2100 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.248000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8795c467a8 items=0 ppid=2100 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333626466613831643131306262313036313131633466346634646364 Jul 2 07:57:48.300209 kernel: audit: type=1327 audit(1719907068.248:452): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333626466613831643131306262313036313131633466346634646364 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.324852 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.324975 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.350706 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.350839 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.350872 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.389215 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.389375 kernel: audit: type=1400 audit(1719907068.248:453): avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.248000 audit: BPF prog-id=67 op=LOAD Jul 2 07:57:48.248000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ce608 items=0 ppid=2100 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333626466613831643131306262313036313131633466346634646364 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit: BPF prog-id=68 op=LOAD Jul 2 07:57:48.265000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ce658 items=0 ppid=2100 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333626466613831643131306262313036313131633466346634646364 Jul 2 07:57:48.265000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:57:48.265000 audit: BPF prog-id=67 op=UNLOAD Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.265000 audit: BPF prog-id=69 op=LOAD Jul 2 07:57:48.265000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ce6e8 items=0 ppid=2100 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333626466613831643131306262313036313131633466346634646364 Jul 2 07:57:48.391094 env[1426]: time="2024-07-02T07:57:48.391044294Z" level=info msg="StartContainer for \"c3bdfa81d110bb106111c4f4f4dcd1c4d086d6417cbbd0833190e1607fb1fc9a\" returns successfully" Jul 2 07:57:48.425000 audit[2268]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.425000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1dbe3ae0 a2=0 a3=7ffc1dbe3acc items=0 ppid=2226 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:57:48.428000 audit[2269]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.428000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd34dd98b0 a2=0 a3=7ffd34dd989c items=0 ppid=2226 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:57:48.429000 audit[2270]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.429000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee993cfa0 a2=0 a3=7ffee993cf8c items=0 ppid=2226 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:57:48.430000 audit[2271]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.430000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd75f37e50 a2=0 a3=7ffd75f37e3c items=0 ppid=2226 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:57:48.431000 audit[2272]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.431000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1615ae40 a2=0 a3=7ffc1615ae2c items=0 ppid=2226 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:57:48.433000 audit[2273]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.433000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1e75fb30 a2=0 a3=7ffc1e75fb1c items=0 ppid=2226 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:57:48.529000 audit[2274]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.529000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff985a8d40 a2=0 a3=7fff985a8d2c items=0 ppid=2226 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:57:48.532000 audit[2276]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.532000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe191061b0 a2=0 a3=7ffe1910619c items=0 ppid=2226 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:57:48.536000 audit[2279]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.536000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd95a92ac0 a2=0 a3=7ffd95a92aac items=0 ppid=2226 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:57:48.538000 audit[2280]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.538000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe232ef180 a2=0 a3=7ffe232ef16c items=0 ppid=2226 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:57:48.540000 audit[2282]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.540000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec1756180 a2=0 a3=7ffec175616c items=0 ppid=2226 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:57:48.541000 audit[2283]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.541000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd845c0b00 a2=0 a3=7ffd845c0aec items=0 ppid=2226 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:57:48.544000 audit[2285]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.544000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc761fb80 a2=0 a3=7ffcc761fb6c items=0 ppid=2226 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:57:48.547000 audit[2288]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.547000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbf77d360 a2=0 a3=7ffcbf77d34c items=0 ppid=2226 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:57:48.548000 audit[2289]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.548000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb617d920 a2=0 a3=7ffeb617d90c items=0 ppid=2226 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:57:48.551000 audit[2291]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.551000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd09965fc0 a2=0 a3=7ffd09965fac items=0 ppid=2226 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:57:48.552000 audit[2292]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.552000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6a2e2a10 a2=0 a3=7ffc6a2e29fc items=0 ppid=2226 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:57:48.555000 audit[2294]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.555000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea9220140 a2=0 a3=7ffea922012c items=0 ppid=2226 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:48.558000 audit[2297]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.558000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb150e590 a2=0 a3=7ffdb150e57c items=0 ppid=2226 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:48.562000 audit[2300]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.562000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb08c4050 a2=0 a3=7ffcb08c403c items=0 ppid=2226 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:57:48.563000 audit[2301]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.563000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcb6b5e930 a2=0 a3=7ffcb6b5e91c items=0 ppid=2226 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:57:48.565000 audit[2303]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.565000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8eb6d660 a2=0 a3=7fff8eb6d64c items=0 ppid=2226 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:48.597000 audit[2308]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.597000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd66be470 a2=0 a3=7ffcd66be45c items=0 ppid=2226 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:48.598000 audit[2309]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.598000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff51c95a40 a2=0 a3=7fff51c95a2c items=0 ppid=2226 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:57:48.601000 audit[2311]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:48.601000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed315b5b0 a2=0 a3=7ffed315b59c items=0 ppid=2226 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:57:48.618000 audit[2317]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:48.618000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd68383940 a2=0 a3=7ffd6838392c items=0 ppid=2226 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:48.646000 audit[2317]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:48.646000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd68383940 a2=0 a3=7ffd6838392c items=0 ppid=2226 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:48.665000 audit[2325]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.665000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff31820910 a2=0 a3=7fff318208fc items=0 ppid=2226 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:57:48.668000 audit[2327]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.668000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5ba43f40 a2=0 a3=7ffe5ba43f2c items=0 ppid=2226 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:57:48.672000 audit[2330]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.672000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff3438d5b0 a2=0 a3=7fff3438d59c items=0 ppid=2226 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:57:48.673000 audit[2331]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.673000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9cb3c010 a2=0 a3=7ffc9cb3bffc items=0 ppid=2226 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:57:48.675000 audit[2333]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.675000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce8b7a490 a2=0 a3=7ffce8b7a47c items=0 ppid=2226 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:57:48.679000 audit[2334]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.679000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e083fa0 a2=0 a3=7ffc0e083f8c items=0 ppid=2226 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:57:48.681000 audit[2336]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.681000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff794ce2a0 a2=0 a3=7fff794ce28c items=0 ppid=2226 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:57:48.685000 audit[2339]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.685000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcce5fe4e0 a2=0 a3=7ffcce5fe4cc items=0 ppid=2226 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:57:48.686000 audit[2340]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.686000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcaf14bb0 a2=0 a3=7fffcaf14b9c items=0 ppid=2226 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:57:48.688000 audit[2342]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.688000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe2e26db0 a2=0 a3=7fffe2e26d9c items=0 ppid=2226 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:57:48.690000 audit[2343]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.690000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc7ec9b70 a2=0 a3=7fffc7ec9b5c items=0 ppid=2226 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:57:48.692000 audit[2345]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.692000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9b3398a0 a2=0 a3=7ffc9b33988c items=0 ppid=2226 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:48.695000 audit[2348]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.695000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeabda94f0 a2=0 a3=7ffeabda94dc items=0 ppid=2226 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:57:48.699000 audit[2351]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.699000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffaaa61c70 a2=0 a3=7fffaaa61c5c items=0 ppid=2226 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:57:48.700000 audit[2352]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.700000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed774fd90 a2=0 a3=7ffed774fd7c items=0 ppid=2226 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:57:48.702000 audit[2354]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.702000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff62e684d0 a2=0 a3=7fff62e684bc items=0 ppid=2226 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:48.707000 audit[2357]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.707000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdcda85470 a2=0 a3=7ffdcda8545c items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:48.708000 audit[2358]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.708000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea2421f0 a2=0 a3=7ffeea2421dc items=0 ppid=2226 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:57:48.710000 audit[2360]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.710000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3ae7dbb0 a2=0 a3=7ffc3ae7db9c items=0 ppid=2226 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:57:48.711000 audit[2361]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.711000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe30b26ab0 a2=0 a3=7ffe30b26a9c items=0 ppid=2226 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:57:48.713000 audit[2363]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.713000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8e2a8660 a2=0 a3=7ffe8e2a864c items=0 ppid=2226 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:48.717000 audit[2366]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:48.717000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe15bf940 a2=0 a3=7fffe15bf92c items=0 ppid=2226 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:48.719000 audit[2368]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:57:48.719000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc3171d1a0 a2=0 a3=7ffc3171d18c items=0 ppid=2226 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.719000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:48.720000 audit[2368]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:57:48.720000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc3171d1a0 a2=0 a3=7ffc3171d18c items=0 ppid=2226 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.720000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:49.144638 kubelet[1999]: E0702 07:57:49.144575 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:49.255420 kubelet[1999]: E0702 07:57:49.254932 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:49.306367 kubelet[1999]: I0702 07:57:49.306322 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-jfrwt" podStartSLOduration=8.642972558 podStartE2EDuration="14.306263454s" podCreationTimestamp="2024-07-02 07:57:35 +0000 UTC" firstStartedPulling="2024-07-02 07:57:42.507693785 +0000 UTC m=+8.142199307" lastFinishedPulling="2024-07-02 07:57:48.170984681 +0000 UTC m=+13.805490203" observedRunningTime="2024-07-02 07:57:49.306046035 +0000 UTC m=+14.940551557" watchObservedRunningTime="2024-07-02 07:57:49.306263454 +0000 UTC m=+14.940768976" Jul 2 07:57:50.145449 kubelet[1999]: E0702 07:57:50.145383 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:51.146313 kubelet[1999]: E0702 07:57:51.146231 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:51.255716 kubelet[1999]: E0702 07:57:51.255039 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:52.146880 kubelet[1999]: E0702 07:57:52.146829 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:52.639093 env[1426]: time="2024-07-02T07:57:52.639038369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:52.644165 env[1426]: time="2024-07-02T07:57:52.644122387Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:52.647901 env[1426]: time="2024-07-02T07:57:52.647866395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:52.650587 env[1426]: time="2024-07-02T07:57:52.650549916Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:52.651088 env[1426]: time="2024-07-02T07:57:52.651053057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:57:52.653247 env[1426]: time="2024-07-02T07:57:52.653216135Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:57:52.682595 env[1426]: time="2024-07-02T07:57:52.682537345Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e\"" Jul 2 07:57:52.683330 env[1426]: time="2024-07-02T07:57:52.683288407Z" level=info msg="StartContainer for \"4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e\"" Jul 2 07:57:52.707455 systemd[1]: Started cri-containerd-4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e.scope. Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff911818d58 items=0 ppid=2066 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:52.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396337363164343430376538653738653666343837623037383431 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.726000 audit: BPF prog-id=70 op=LOAD Jul 2 07:57:52.726000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000302968 items=0 ppid=2066 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:52.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396337363164343430376538653738653666343837623037383431 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit: BPF prog-id=71 op=LOAD Jul 2 07:57:52.727000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003029b8 items=0 ppid=2066 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:52.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396337363164343430376538653738653666343837623037383431 Jul 2 07:57:52.727000 audit: BPF prog-id=71 op=UNLOAD Jul 2 07:57:52.727000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:52.727000 audit: BPF prog-id=72 op=LOAD Jul 2 07:57:52.727000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302a48 items=0 ppid=2066 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:52.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396337363164343430376538653738653666343837623037383431 Jul 2 07:57:52.747975 env[1426]: time="2024-07-02T07:57:52.747919121Z" level=info msg="StartContainer for \"4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e\" returns successfully" Jul 2 07:57:53.147657 kubelet[1999]: E0702 07:57:53.147599 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:53.255008 kubelet[1999]: E0702 07:57:53.254959 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:54.148547 kubelet[1999]: E0702 07:57:54.148503 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:54.150824 env[1426]: time="2024-07-02T07:57:54.150752191Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:57:54.152933 systemd[1]: cri-containerd-4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e.scope: Deactivated successfully. Jul 2 07:57:54.156000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:57:54.161666 kernel: kauditd_printk_skb: 229 callbacks suppressed Jul 2 07:57:54.161731 kernel: audit: type=1334 audit(1719907074.156:515): prog-id=72 op=UNLOAD Jul 2 07:57:54.181349 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e-rootfs.mount: Deactivated successfully. Jul 2 07:57:54.234154 kubelet[1999]: I0702 07:57:54.233483 1999 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:57:55.133313 kubelet[1999]: E0702 07:57:55.133252 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:55.149664 kubelet[1999]: E0702 07:57:55.149597 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:55.261395 systemd[1]: Created slice kubepods-besteffort-poda2b74567_ff4c_415f_9bbd_3c8a913fb76e.slice. Jul 2 07:57:55.264146 env[1426]: time="2024-07-02T07:57:55.264106593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fcpmm,Uid:a2b74567-ff4c-415f-9bbd-3c8a913fb76e,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:56.150670 kubelet[1999]: E0702 07:57:56.150601 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:57.151806 kubelet[1999]: E0702 07:57:57.151742 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:57.668139 kubelet[1999]: I0702 07:57:57.427234 1999 topology_manager.go:215] "Topology Admit Handler" podUID="36cedde1-bd56-4ac1-a0fb-b05e76e0e71e" podNamespace="default" podName="nginx-deployment-6d5f899847-8hjcg" Jul 2 07:57:57.668139 kubelet[1999]: I0702 07:57:57.448069 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lpxxl\" (UniqueName: \"kubernetes.io/projected/36cedde1-bd56-4ac1-a0fb-b05e76e0e71e-kube-api-access-lpxxl\") pod \"nginx-deployment-6d5f899847-8hjcg\" (UID: \"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e\") " pod="default/nginx-deployment-6d5f899847-8hjcg" Jul 2 07:57:57.433351 systemd[1]: Created slice kubepods-besteffort-pod36cedde1_bd56_4ac1_a0fb_b05e76e0e71e.slice. Jul 2 07:57:57.917452 env[1426]: time="2024-07-02T07:57:57.917386161Z" level=info msg="shim disconnected" id=4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e Jul 2 07:57:57.917978 env[1426]: time="2024-07-02T07:57:57.917470667Z" level=warning msg="cleaning up after shim disconnected" id=4e9c761d4407e8e78e6f487b078413d60e6403285b8e9726052e493a2702998e namespace=k8s.io Jul 2 07:57:57.917978 env[1426]: time="2024-07-02T07:57:57.917487168Z" level=info msg="cleaning up dead shim" Jul 2 07:57:57.927326 env[1426]: time="2024-07-02T07:57:57.926759447Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:57:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2417 runtime=io.containerd.runc.v2\n" Jul 2 07:57:58.008174 env[1426]: time="2024-07-02T07:57:58.008121194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-8hjcg,Uid:36cedde1-bd56-4ac1-a0fb-b05e76e0e71e,Namespace:default,Attempt:0,}" Jul 2 07:57:58.152547 kubelet[1999]: E0702 07:57:58.152490 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:58.264187 env[1426]: time="2024-07-02T07:57:58.264025820Z" level=error msg="Failed to destroy network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.267062 env[1426]: time="2024-07-02T07:57:58.266990133Z" level=error msg="encountered an error cleaning up failed sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.267324 env[1426]: time="2024-07-02T07:57:58.267271153Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fcpmm,Uid:a2b74567-ff4c-415f-9bbd-3c8a913fb76e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.267630 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c-shm.mount: Deactivated successfully. Jul 2 07:57:58.268327 kubelet[1999]: E0702 07:57:58.267702 1999 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.268327 kubelet[1999]: E0702 07:57:58.267780 1999 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:58.268327 kubelet[1999]: E0702 07:57:58.267808 1999 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fcpmm" Jul 2 07:57:58.268495 kubelet[1999]: E0702 07:57:58.267879 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fcpmm_calico-system(a2b74567-ff4c-415f-9bbd-3c8a913fb76e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fcpmm_calico-system(a2b74567-ff4c-415f-9bbd-3c8a913fb76e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:58.318754 env[1426]: time="2024-07-02T07:57:58.318702036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:57:58.319688 kubelet[1999]: I0702 07:57:58.319621 1999 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:57:58.321958 env[1426]: time="2024-07-02T07:57:58.320381956Z" level=info msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" Jul 2 07:57:58.346885 env[1426]: time="2024-07-02T07:57:58.346816049Z" level=error msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" failed" error="failed to destroy network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.347170 kubelet[1999]: E0702 07:57:58.347141 1999 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:57:58.347283 kubelet[1999]: E0702 07:57:58.347251 1999 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c"} Jul 2 07:57:58.347330 kubelet[1999]: E0702 07:57:58.347307 1999 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:58.347416 kubelet[1999]: E0702 07:57:58.347349 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2b74567-ff4c-415f-9bbd-3c8a913fb76e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fcpmm" podUID="a2b74567-ff4c-415f-9bbd-3c8a913fb76e" Jul 2 07:57:58.605430 env[1426]: time="2024-07-02T07:57:58.604433598Z" level=error msg="Failed to destroy network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.605430 env[1426]: time="2024-07-02T07:57:58.604846228Z" level=error msg="encountered an error cleaning up failed sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.605430 env[1426]: time="2024-07-02T07:57:58.604919033Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-8hjcg,Uid:36cedde1-bd56-4ac1-a0fb-b05e76e0e71e,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.605766 kubelet[1999]: E0702 07:57:58.605265 1999 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:58.605766 kubelet[1999]: E0702 07:57:58.605357 1999 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-8hjcg" Jul 2 07:57:58.605766 kubelet[1999]: E0702 07:57:58.605386 1999 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-8hjcg" Jul 2 07:57:58.605923 kubelet[1999]: E0702 07:57:58.605493 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-8hjcg_default(36cedde1-bd56-4ac1-a0fb-b05e76e0e71e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-8hjcg_default(36cedde1-bd56-4ac1-a0fb-b05e76e0e71e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-8hjcg" podUID="36cedde1-bd56-4ac1-a0fb-b05e76e0e71e" Jul 2 07:57:58.713836 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490-shm.mount: Deactivated successfully. Jul 2 07:57:59.153734 kubelet[1999]: E0702 07:57:59.153672 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:59.322913 kubelet[1999]: I0702 07:57:59.322880 1999 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:57:59.323720 env[1426]: time="2024-07-02T07:57:59.323679895Z" level=info msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" Jul 2 07:57:59.347971 env[1426]: time="2024-07-02T07:57:59.347905592Z" level=error msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" failed" error="failed to destroy network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:59.348212 kubelet[1999]: E0702 07:57:59.348185 1999 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:57:59.348293 kubelet[1999]: E0702 07:57:59.348242 1999 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490"} Jul 2 07:57:59.348341 kubelet[1999]: E0702 07:57:59.348290 1999 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:59.348341 kubelet[1999]: E0702 07:57:59.348334 1999 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-8hjcg" podUID="36cedde1-bd56-4ac1-a0fb-b05e76e0e71e" Jul 2 07:58:00.154539 kubelet[1999]: E0702 07:58:00.154473 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:01.155691 kubelet[1999]: E0702 07:58:01.155580 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:02.155872 kubelet[1999]: E0702 07:58:02.155802 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:03.156847 kubelet[1999]: E0702 07:58:03.156782 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:04.157400 kubelet[1999]: E0702 07:58:04.157329 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:05.157896 kubelet[1999]: E0702 07:58:05.157831 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:06.158373 kubelet[1999]: E0702 07:58:06.158288 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:07.159283 kubelet[1999]: E0702 07:58:07.159195 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:08.160064 kubelet[1999]: E0702 07:58:08.159976 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:09.160779 kubelet[1999]: E0702 07:58:09.160687 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:09.276949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount693427966.mount: Deactivated successfully. Jul 2 07:58:09.565495 env[1426]: time="2024-07-02T07:58:09.564961037Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.655691 env[1426]: time="2024-07-02T07:58:09.655588778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.706131 env[1426]: time="2024-07-02T07:58:09.706062641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.753141 env[1426]: time="2024-07-02T07:58:09.753077008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.753883 env[1426]: time="2024-07-02T07:58:09.753832951Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:58:09.770920 env[1426]: time="2024-07-02T07:58:09.770878918Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:58:10.161707 kubelet[1999]: E0702 07:58:10.161637 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:10.210047 env[1426]: time="2024-07-02T07:58:10.209965297Z" level=info msg="CreateContainer within sandbox \"6c50a1fd9694cfcd51b7d1fe62e7651f6f73c367feb4d8f81ae5363fafe6508c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585\"" Jul 2 07:58:10.210859 env[1426]: time="2024-07-02T07:58:10.210777942Z" level=info msg="StartContainer for \"cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585\"" Jul 2 07:58:10.236627 systemd[1]: Started cri-containerd-cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585.scope. Jul 2 07:58:10.255000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.289683 kernel: audit: type=1400 audit(1719907090.255:516): avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.289842 kernel: audit: type=1300 audit(1719907090.255:516): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc60f1f35f8 items=0 ppid=2066 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.255000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc60f1f35f8 items=0 ppid=2066 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.307223 kernel: audit: type=1327 audit(1719907090.255:516): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316532333265666463316162666363386366383563663765626535 Jul 2 07:58:10.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316532333265666463316162666363386366383563663765626535 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.319041 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.328811 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.330853 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.349578 env[1426]: time="2024-07-02T07:58:10.349520257Z" level=info msg="StartContainer for \"cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585\" returns successfully" Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.367802 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.367958 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.367986 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit: BPF prog-id=73 op=LOAD Jul 2 07:58:10.256000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000382918 items=0 ppid=2066 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.393711 kernel: audit: type=1400 audit(1719907090.256:517): avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316532333265666463316162666363386366383563663765626535 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.268000 audit: BPF prog-id=74 op=LOAD Jul 2 07:58:10.268000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000382968 items=0 ppid=2066 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316532333265666463316162666363386366383563663765626535 Jul 2 07:58:10.306000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:58:10.306000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:10.306000 audit: BPF prog-id=75 op=LOAD Jul 2 07:58:10.306000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003829f8 items=0 ppid=2066 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:10.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316532333265666463316162666363386366383563663765626535 Jul 2 07:58:10.952716 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:58:10.952904 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:58:11.162427 kubelet[1999]: E0702 07:58:11.162349 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:12.162637 kubelet[1999]: E0702 07:58:12.162571 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:12.256949 env[1426]: time="2024-07-02T07:58:12.256897337Z" level=info msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" Jul 2 07:58:12.257510 env[1426]: time="2024-07-02T07:58:12.257478468Z" level=info msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" Jul 2 07:58:12.259000 audit[2650]: AVC avc: denied { write } for pid=2650 comm="tee" name="fd" dev="proc" ino=23563 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.259000 audit[2650]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3e9f1a19 a2=241 a3=1b6 items=1 ppid=2631 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.259000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:58:12.259000 audit: PATH item=0 name="/dev/fd/63" inode=23553 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.259000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.277000 audit[2676]: AVC avc: denied { write } for pid=2676 comm="tee" name="fd" dev="proc" ino=23602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.279000 audit[2678]: AVC avc: denied { write } for pid=2678 comm="tee" name="fd" dev="proc" ino=23605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.277000 audit[2676]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc04007a1b a2=241 a3=1b6 items=1 ppid=2625 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.277000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:58:12.277000 audit: PATH item=0 name="/dev/fd/63" inode=23566 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.279000 audit[2678]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdc7a1a1a a2=241 a3=1b6 items=1 ppid=2635 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.279000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:58:12.279000 audit: PATH item=0 name="/dev/fd/63" inode=23593 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.279000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.302000 audit[2702]: AVC avc: denied { write } for pid=2702 comm="tee" name="fd" dev="proc" ino=23502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.302000 audit[2702]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd68d4a19 a2=241 a3=1b6 items=1 ppid=2638 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.302000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:58:12.302000 audit: PATH item=0 name="/dev/fd/63" inode=23609 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.302000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.344000 audit[2716]: AVC avc: denied { write } for pid=2716 comm="tee" name="fd" dev="proc" ino=23521 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.345000 audit[2721]: AVC avc: denied { write } for pid=2721 comm="tee" name="fd" dev="proc" ino=23522 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.345000 audit[2721]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8365da0a a2=241 a3=1b6 items=1 ppid=2627 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.345000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:58:12.345000 audit: PATH item=0 name="/dev/fd/63" inode=23506 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.344000 audit[2716]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf28cca09 a2=241 a3=1b6 items=1 ppid=2628 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.344000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:58:12.344000 audit: PATH item=0 name="/dev/fd/63" inode=23503 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.352000 audit[2727]: AVC avc: denied { write } for pid=2727 comm="tee" name="fd" dev="proc" ino=23626 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:12.352000 audit[2727]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcca728a19 a2=241 a3=1b6 items=1 ppid=2641 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.352000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:58:12.352000 audit: PATH item=0 name="/dev/fd/63" inode=23517 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:12.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:12.367231 kubelet[1999]: I0702 07:58:12.367191 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tzb9p" podStartSLOduration=10.111120455 podStartE2EDuration="37.367131833s" podCreationTimestamp="2024-07-02 07:57:35 +0000 UTC" firstStartedPulling="2024-07-02 07:57:42.498351903 +0000 UTC m=+8.132857525" lastFinishedPulling="2024-07-02 07:58:09.754363381 +0000 UTC m=+35.388868903" observedRunningTime="2024-07-02 07:58:11.366741239 +0000 UTC m=+37.001246861" watchObservedRunningTime="2024-07-02 07:58:12.367131833 +0000 UTC m=+38.001637355" Jul 2 07:58:12.411369 systemd[1]: run-containerd-runc-k8s.io-cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585-runc.CFtff9.mount: Deactivated successfully. Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.398 [INFO][2688] k8s.go 608: Cleaning up netns ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.398 [INFO][2688] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" iface="eth0" netns="/var/run/netns/cni-1dec3cc6-3742-9b05-9c70-90fb4d522eab" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.398 [INFO][2688] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" iface="eth0" netns="/var/run/netns/cni-1dec3cc6-3742-9b05-9c70-90fb4d522eab" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.398 [INFO][2688] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" iface="eth0" netns="/var/run/netns/cni-1dec3cc6-3742-9b05-9c70-90fb4d522eab" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.399 [INFO][2688] k8s.go 615: Releasing IP address(es) ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.399 [INFO][2688] utils.go 188: Calico CNI releasing IP address ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.504 [INFO][2750] ipam_plugin.go 411: Releasing address using handleID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.505 [INFO][2750] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.505 [INFO][2750] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.521 [WARNING][2750] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.521 [INFO][2750] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.522 [INFO][2750] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:12.528922 env[1426]: 2024-07-02 07:58:12.526 [INFO][2688] k8s.go 621: Teardown processing complete. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:12.533582 env[1426]: time="2024-07-02T07:58:12.531868545Z" level=info msg="TearDown network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" successfully" Jul 2 07:58:12.533582 env[1426]: time="2024-07-02T07:58:12.531944149Z" level=info msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" returns successfully" Jul 2 07:58:12.533582 env[1426]: time="2024-07-02T07:58:12.533161014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-8hjcg,Uid:36cedde1-bd56-4ac1-a0fb-b05e76e0e71e,Namespace:default,Attempt:1,}" Jul 2 07:58:12.532028 systemd[1]: run-netns-cni\x2d1dec3cc6\x2d3742\x2d9b05\x2d9c70\x2d90fb4d522eab.mount: Deactivated successfully. Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.367 [INFO][2703] k8s.go 608: Cleaning up netns ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.427 [INFO][2703] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" iface="eth0" netns="/var/run/netns/cni-51e6c068-d26c-b658-c626-1880da27a29a" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.427 [INFO][2703] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" iface="eth0" netns="/var/run/netns/cni-51e6c068-d26c-b658-c626-1880da27a29a" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.427 [INFO][2703] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" iface="eth0" netns="/var/run/netns/cni-51e6c068-d26c-b658-c626-1880da27a29a" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.427 [INFO][2703] k8s.go 615: Releasing IP address(es) ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.427 [INFO][2703] utils.go 188: Calico CNI releasing IP address ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.526 [INFO][2754] ipam_plugin.go 411: Releasing address using handleID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.526 [INFO][2754] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.526 [INFO][2754] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.543 [WARNING][2754] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.543 [INFO][2754] ipam_plugin.go 439: Releasing address using workloadID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.544 [INFO][2754] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:12.550801 env[1426]: 2024-07-02 07:58:12.549 [INFO][2703] k8s.go 621: Teardown processing complete. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:12.553671 env[1426]: time="2024-07-02T07:58:12.553472300Z" level=info msg="TearDown network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" successfully" Jul 2 07:58:12.553671 env[1426]: time="2024-07-02T07:58:12.553533103Z" level=info msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" returns successfully" Jul 2 07:58:12.554062 systemd[1]: run-netns-cni\x2d51e6c068\x2dd26c\x2db658\x2dc626\x2d1880da27a29a.mount: Deactivated successfully. Jul 2 07:58:12.555825 env[1426]: time="2024-07-02T07:58:12.554473154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fcpmm,Uid:a2b74567-ff4c-415f-9bbd-3c8a913fb76e,Namespace:calico-system,Attempt:1,}" Jul 2 07:58:12.812753 kernel: Initializing XFRM netlink socket Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.924000 audit: BPF prog-id=76 op=LOAD Jul 2 07:58:12.924000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca875e340 a2=70 a3=7fcce4d0c000 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.924000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.926000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.926000 audit: BPF prog-id=77 op=LOAD Jul 2 07:58:12.926000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca875e340 a2=70 a3=6f items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.926000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.927000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:58:12.927000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.927000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca875e2f0 a2=70 a3=7ffca875e340 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.927000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit: BPF prog-id=78 op=LOAD Jul 2 07:58:12.928000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffca875e2d0 a2=70 a3=7ffca875e340 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.928000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.928000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca875e3b0 a2=70 a3=0 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.928000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.928000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.928000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca875e3a0 a2=70 a3=0 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.928000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.929000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.929000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca875e310 a2=70 a3=0 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.929000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.931000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.931000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffca875e3e0 a2=70 a3=20e7a00 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.931000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.933000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.933000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca875e3e0 a2=70 a3=20e4880 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.933000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.934000 audit: BPF prog-id=79 op=LOAD Jul 2 07:58:12.934000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca875e300 a2=70 a3=0 items=0 ppid=2666 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.934000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:12.936105 systemd-networkd[1582]: vxlan.calico: Link UP Jul 2 07:58:12.936111 systemd-networkd[1582]: vxlan.calico: Gained carrier Jul 2 07:58:12.947000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.947000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2b404460 a2=70 a3=fff80800 items=0 ppid=2666 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:12.948000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:12.948000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2b404330 a2=70 a3=3 items=0 ppid=2666 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:12.957000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:58:13.163247 kubelet[1999]: E0702 07:58:13.163194 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:13.233000 audit[2872]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.233000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffed507a2a0 a2=0 a3=7ffed507a28c items=0 ppid=2666 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.233000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.262000 audit[2871]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.262000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc9e3e1ff0 a2=0 a3=7ffc9e3e1fdc items=0 ppid=2666 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.262000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.329000 audit[2873]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.329000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdf04d14b0 a2=0 a3=7ffdf04d149c items=0 ppid=2666 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.329000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.332000 audit[2874]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.332000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc51887380 a2=0 a3=7ffc5188736c items=0 ppid=2666 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.456083 systemd-networkd[1582]: cali9124a3cf195: Link UP Jul 2 07:58:13.461120 systemd-networkd[1582]: cali9124a3cf195: Gained carrier Jul 2 07:58:13.461884 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9124a3cf195: link becomes ready Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.362 [INFO][2880] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-csi--node--driver--fcpmm-eth0 csi-node-driver- calico-system a2b74567-ff4c-415f-9bbd-3c8a913fb76e 1177 0 2024-07-02 07:57:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 csi-node-driver-fcpmm eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9124a3cf195 [] []}} ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.363 [INFO][2880] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.415 [INFO][2906] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" HandleID="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.426 [INFO][2906] ipam_plugin.go 264: Auto assigning IP ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" HandleID="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000286430), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.13", "pod":"csi-node-driver-fcpmm", "timestamp":"2024-07-02 07:58:13.415099967 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.426 [INFO][2906] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.426 [INFO][2906] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.426 [INFO][2906] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.429 [INFO][2906] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.432 [INFO][2906] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.439 [INFO][2906] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.441 [INFO][2906] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.443 [INFO][2906] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.443 [INFO][2906] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.444 [INFO][2906] ipam.go 1685: Creating new handle: k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.447 [INFO][2906] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.451 [INFO][2906] ipam.go 1216: Successfully claimed IPs: [192.168.17.193/26] block=192.168.17.192/26 handle="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.451 [INFO][2906] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.193/26] handle="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" host="10.200.8.13" Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.451 [INFO][2906] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:13.477809 env[1426]: 2024-07-02 07:58:13.452 [INFO][2906] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.193/26] IPv6=[] ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" HandleID="k8s-pod-network.6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.453 [INFO][2880] k8s.go 386: Populated endpoint ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--fcpmm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2b74567-ff4c-415f-9bbd-3c8a913fb76e", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"csi-node-driver-fcpmm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9124a3cf195", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.453 [INFO][2880] k8s.go 387: Calico CNI using IPs: [192.168.17.193/32] ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.453 [INFO][2880] dataplane_linux.go 68: Setting the host side veth name to cali9124a3cf195 ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.462 [INFO][2880] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.463 [INFO][2880] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--fcpmm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2b74567-ff4c-415f-9bbd-3c8a913fb76e", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c", Pod:"csi-node-driver-fcpmm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9124a3cf195", MAC:"9a:3f:0f:8f:29:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:13.479009 env[1426]: 2024-07-02 07:58:13.473 [INFO][2880] k8s.go 500: Wrote updated endpoint to datastore ContainerID="6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c" Namespace="calico-system" Pod="csi-node-driver-fcpmm" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:13.489000 audit[2925]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.489000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff0b4fc7b0 a2=0 a3=7fff0b4fc79c items=0 ppid=2666 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.504573 env[1426]: time="2024-07-02T07:58:13.504319948Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:13.504573 env[1426]: time="2024-07-02T07:58:13.504378952Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:13.504573 env[1426]: time="2024-07-02T07:58:13.504389952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:13.506716 env[1426]: time="2024-07-02T07:58:13.504675867Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c pid=2940 runtime=io.containerd.runc.v2 Jul 2 07:58:13.523327 systemd-networkd[1582]: cali86a0f049aa7: Link UP Jul 2 07:58:13.530342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali86a0f049aa7: link becomes ready Jul 2 07:58:13.529693 systemd-networkd[1582]: cali86a0f049aa7: Gained carrier Jul 2 07:58:13.543971 systemd[1]: run-containerd-runc-k8s.io-6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c-runc.qavDp3.mount: Deactivated successfully. Jul 2 07:58:13.551142 systemd[1]: Started cri-containerd-6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c.scope. Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.426 [INFO][2897] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0 nginx-deployment-6d5f899847- default 36cedde1-bd56-4ac1-a0fb-b05e76e0e71e 1178 0 2024-07-02 07:57:57 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 nginx-deployment-6d5f899847-8hjcg eth0 default [] [] [kns.default ksa.default.default] cali86a0f049aa7 [] []}} ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.426 [INFO][2897] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.484 [INFO][2914] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" HandleID="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.495 [INFO][2914] ipam_plugin.go 264: Auto assigning IP ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" HandleID="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000580890), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nginx-deployment-6d5f899847-8hjcg", "timestamp":"2024-07-02 07:58:13.484825325 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.495 [INFO][2914] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.495 [INFO][2914] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.495 [INFO][2914] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.496 [INFO][2914] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.500 [INFO][2914] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.503 [INFO][2914] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.505 [INFO][2914] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.507 [INFO][2914] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.507 [INFO][2914] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.508 [INFO][2914] ipam.go 1685: Creating new handle: k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.513 [INFO][2914] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.517 [INFO][2914] ipam.go 1216: Successfully claimed IPs: [192.168.17.194/26] block=192.168.17.192/26 handle="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.517 [INFO][2914] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.194/26] handle="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" host="10.200.8.13" Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.517 [INFO][2914] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:13.558144 env[1426]: 2024-07-02 07:58:13.517 [INFO][2914] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.194/26] IPv6=[] ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" HandleID="k8s-pod-network.5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.519 [INFO][2897] k8s.go 386: Populated endpoint ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nginx-deployment-6d5f899847-8hjcg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali86a0f049aa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.519 [INFO][2897] k8s.go 387: Calico CNI using IPs: [192.168.17.194/32] ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.519 [INFO][2897] dataplane_linux.go 68: Setting the host side veth name to cali86a0f049aa7 ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.531 [INFO][2897] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.547 [INFO][2897] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b", Pod:"nginx-deployment-6d5f899847-8hjcg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali86a0f049aa7", MAC:"9e:21:6f:21:5f:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:13.559086 env[1426]: 2024-07-02 07:58:13.553 [INFO][2897] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b" Namespace="default" Pod="nginx-deployment-6d5f899847-8hjcg" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.566000 audit: BPF prog-id=80 op=LOAD Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2940 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663363353564653364386239346137633130336239356532343633 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2940 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663363353564653364386239346137633130336239356532343633 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit: BPF prog-id=81 op=LOAD Jul 2 07:58:13.567000 audit[2951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f9f20 items=0 ppid=2940 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663363353564653364386239346137633130336239356532343633 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.567000 audit: BPF prog-id=82 op=LOAD Jul 2 07:58:13.567000 audit[2951]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000f9f68 items=0 ppid=2940 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663363353564653364386239346137633130336239356532343633 Jul 2 07:58:13.567000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:58:13.567000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { perfmon } for pid=2951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit[2951]: AVC avc: denied { bpf } for pid=2951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.568000 audit: BPF prog-id=83 op=LOAD Jul 2 07:58:13.568000 audit[2951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d8378 items=0 ppid=2940 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663363353564653364386239346137633130336239356532343633 Jul 2 07:58:13.588091 env[1426]: time="2024-07-02T07:58:13.588043842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fcpmm,Uid:a2b74567-ff4c-415f-9bbd-3c8a913fb76e,Namespace:calico-system,Attempt:1,} returns sandbox id \"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c\"" Jul 2 07:58:13.590599 env[1426]: time="2024-07-02T07:58:13.590566174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:58:13.594000 audit[2989]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:13.594000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff1e06abb0 a2=0 a3=7fff1e06ab9c items=0 ppid=2666 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.594000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:13.611621 env[1426]: time="2024-07-02T07:58:13.611452270Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:13.611621 env[1426]: time="2024-07-02T07:58:13.611485672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:13.611621 env[1426]: time="2024-07-02T07:58:13.611495773Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:13.611875 env[1426]: time="2024-07-02T07:58:13.611831390Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b pid=2998 runtime=io.containerd.runc.v2 Jul 2 07:58:13.632381 systemd[1]: Started cri-containerd-5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b.scope. Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit: BPF prog-id=84 op=LOAD Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2998 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562393036356634623531346131303231346130316637346637326665 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2998 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562393036356634623531346131303231346130316637346637326665 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.647000 audit: BPF prog-id=85 op=LOAD Jul 2 07:58:13.647000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbe90 items=0 ppid=2998 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562393036356634623531346131303231346130316637346637326665 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit: BPF prog-id=86 op=LOAD Jul 2 07:58:13.648000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbed8 items=0 ppid=2998 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562393036356634623531346131303231346130316637346637326665 Jul 2 07:58:13.648000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:58:13.648000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.648000 audit: BPF prog-id=87 op=LOAD Jul 2 07:58:13.648000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f02e8 items=0 ppid=2998 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:13.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562393036356634623531346131303231346130316637346637326665 Jul 2 07:58:13.677999 env[1426]: time="2024-07-02T07:58:13.677948060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-8hjcg,Uid:36cedde1-bd56-4ac1-a0fb-b05e76e0e71e,Namespace:default,Attempt:1,} returns sandbox id \"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b\"" Jul 2 07:58:14.163516 kubelet[1999]: E0702 07:58:14.163462 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:14.240073 systemd-networkd[1582]: vxlan.calico: Gained IPv6LL Jul 2 07:58:15.072000 systemd-networkd[1582]: cali9124a3cf195: Gained IPv6LL Jul 2 07:58:15.132554 kubelet[1999]: E0702 07:58:15.132489 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:15.164180 kubelet[1999]: E0702 07:58:15.164134 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:15.244276 env[1426]: time="2024-07-02T07:58:15.244213499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:15.249831 env[1426]: time="2024-07-02T07:58:15.249786481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:15.254439 env[1426]: time="2024-07-02T07:58:15.254396514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:15.258441 env[1426]: time="2024-07-02T07:58:15.258405416Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:15.258937 env[1426]: time="2024-07-02T07:58:15.258906942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:58:15.260099 env[1426]: time="2024-07-02T07:58:15.260067900Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:58:15.261148 env[1426]: time="2024-07-02T07:58:15.261119054Z" level=info msg="CreateContainer within sandbox \"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:58:15.300186 env[1426]: time="2024-07-02T07:58:15.300134826Z" level=info msg="CreateContainer within sandbox \"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"29d84d7ff0751963dab599dbb5f17d007b8e642ba90223e83a688aaaed8ce478\"" Jul 2 07:58:15.300827 env[1426]: time="2024-07-02T07:58:15.300718755Z" level=info msg="StartContainer for \"29d84d7ff0751963dab599dbb5f17d007b8e642ba90223e83a688aaaed8ce478\"" Jul 2 07:58:15.326436 systemd[1]: run-containerd-runc-k8s.io-29d84d7ff0751963dab599dbb5f17d007b8e642ba90223e83a688aaaed8ce478-runc.KiDMpJ.mount: Deactivated successfully. Jul 2 07:58:15.331166 systemd[1]: Started cri-containerd-29d84d7ff0751963dab599dbb5f17d007b8e642ba90223e83a688aaaed8ce478.scope. Jul 2 07:58:15.348000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.353100 kernel: kauditd_printk_skb: 277 callbacks suppressed Jul 2 07:58:15.353208 kernel: audit: type=1400 audit(1719907095.348:587): avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.348000 audit[3039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f95b342be18 items=0 ppid=2940 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643834643766663037353139363364616235393964626235663137 Jul 2 07:58:15.403656 kernel: audit: type=1300 audit(1719907095.348:587): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f95b342be18 items=0 ppid=2940 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.403830 kernel: audit: type=1327 audit(1719907095.348:587): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643834643766663037353139363364616235393964626235663137 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.429662 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.429803 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.431503 env[1426]: time="2024-07-02T07:58:15.429922986Z" level=info msg="StartContainer for \"29d84d7ff0751963dab599dbb5f17d007b8e642ba90223e83a688aaaed8ce478\" returns successfully" Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.451232 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.451362 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.451398 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.457796 systemd-networkd[1582]: cali86a0f049aa7: Gained IPv6LL Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.476859 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.487713 kernel: audit: type=1400 audit(1719907095.360:588): avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.360000 audit: BPF prog-id=88 op=LOAD Jul 2 07:58:15.360000 audit[3039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000092618 items=0 ppid=2940 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643834643766663037353139363364616235393964626235663137 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit: BPF prog-id=89 op=LOAD Jul 2 07:58:15.366000 audit[3039]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00040a2b8 items=0 ppid=2940 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643834643766663037353139363364616235393964626235663137 Jul 2 07:58:15.366000 audit: BPF prog-id=89 op=UNLOAD Jul 2 07:58:15.366000 audit: BPF prog-id=88 op=UNLOAD Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.366000 audit: BPF prog-id=90 op=LOAD Jul 2 07:58:15.366000 audit[3039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00040a348 items=0 ppid=2940 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643834643766663037353139363364616235393964626235663137 Jul 2 07:58:16.165050 kubelet[1999]: E0702 07:58:16.164988 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:17.165917 kubelet[1999]: E0702 07:58:17.165844 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:18.166243 kubelet[1999]: E0702 07:58:18.166162 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:18.450196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1845490435.mount: Deactivated successfully. Jul 2 07:58:19.166818 kubelet[1999]: E0702 07:58:19.166737 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:19.891658 env[1426]: time="2024-07-02T07:58:19.891593466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.896206 env[1426]: time="2024-07-02T07:58:19.896157981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.900606 env[1426]: time="2024-07-02T07:58:19.900562188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.904496 env[1426]: time="2024-07-02T07:58:19.904460572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.905092 env[1426]: time="2024-07-02T07:58:19.905058500Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:58:19.906169 env[1426]: time="2024-07-02T07:58:19.906133950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:58:19.907626 env[1426]: time="2024-07-02T07:58:19.907599219Z" level=info msg="CreateContainer within sandbox \"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 07:58:19.940069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3847802499.mount: Deactivated successfully. Jul 2 07:58:19.951341 env[1426]: time="2024-07-02T07:58:19.951290674Z" level=info msg="CreateContainer within sandbox \"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"642fc39f0b88a3512977a329c31863e0088ceeb3bf93585e0944c0d73d7409e3\"" Jul 2 07:58:19.952235 env[1426]: time="2024-07-02T07:58:19.952187616Z" level=info msg="StartContainer for \"642fc39f0b88a3512977a329c31863e0088ceeb3bf93585e0944c0d73d7409e3\"" Jul 2 07:58:19.972406 systemd[1]: Started cri-containerd-642fc39f0b88a3512977a329c31863e0088ceeb3bf93585e0944c0d73d7409e3.scope. Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.989000 audit: BPF prog-id=91 op=LOAD Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2998 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326663333966306238386133353132393737613332396333313836 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2998 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326663333966306238386133353132393737613332396333313836 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit: BPF prog-id=92 op=LOAD Jul 2 07:58:19.990000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000298d60 items=0 ppid=2998 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326663333966306238386133353132393737613332396333313836 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit: BPF prog-id=93 op=LOAD Jul 2 07:58:19.990000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000298da8 items=0 ppid=2998 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326663333966306238386133353132393737613332396333313836 Jul 2 07:58:19.990000 audit: BPF prog-id=93 op=UNLOAD Jul 2 07:58:19.990000 audit: BPF prog-id=92 op=UNLOAD Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { perfmon } for pid=3083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit[3083]: AVC avc: denied { bpf } for pid=3083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.990000 audit: BPF prog-id=94 op=LOAD Jul 2 07:58:19.990000 audit[3083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002991b8 items=0 ppid=2998 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326663333966306238386133353132393737613332396333313836 Jul 2 07:58:20.011234 env[1426]: time="2024-07-02T07:58:20.011184583Z" level=info msg="StartContainer for \"642fc39f0b88a3512977a329c31863e0088ceeb3bf93585e0944c0d73d7409e3\" returns successfully" Jul 2 07:58:20.167959 kubelet[1999]: E0702 07:58:20.167794 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:21.169007 kubelet[1999]: E0702 07:58:21.168936 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:21.651253 env[1426]: time="2024-07-02T07:58:21.651197579Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.655766 env[1426]: time="2024-07-02T07:58:21.655715784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.659892 env[1426]: time="2024-07-02T07:58:21.659849472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.663322 env[1426]: time="2024-07-02T07:58:21.663285428Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.663734 env[1426]: time="2024-07-02T07:58:21.663699047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:58:21.666233 env[1426]: time="2024-07-02T07:58:21.666201061Z" level=info msg="CreateContainer within sandbox \"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:58:21.693601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2792490069.mount: Deactivated successfully. Jul 2 07:58:21.708314 env[1426]: time="2024-07-02T07:58:21.708254172Z" level=info msg="CreateContainer within sandbox \"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f7cce5e3afb1fe24d8d0782d75153257961fd6d18e7973070944341ca95dbcf1\"" Jul 2 07:58:21.709059 env[1426]: time="2024-07-02T07:58:21.708996305Z" level=info msg="StartContainer for \"f7cce5e3afb1fe24d8d0782d75153257961fd6d18e7973070944341ca95dbcf1\"" Jul 2 07:58:21.738430 systemd[1]: Started cri-containerd-f7cce5e3afb1fe24d8d0782d75153257961fd6d18e7973070944341ca95dbcf1.scope. Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.757080 kernel: kauditd_printk_skb: 90 callbacks suppressed Jul 2 07:58:21.757194 kernel: audit: type=1400 audit(1719907101.752:611): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6ffadb00a8 items=0 ppid=2940 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.787027 kernel: audit: type=1300 audit(1719907101.752:611): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6ffadb00a8 items=0 ppid=2940 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636365356533616662316665323464386430373832643735313533 Jul 2 07:58:21.799036 env[1426]: time="2024-07-02T07:58:21.798992695Z" level=info msg="StartContainer for \"f7cce5e3afb1fe24d8d0782d75153257961fd6d18e7973070944341ca95dbcf1\" returns successfully" Jul 2 07:58:21.803734 kernel: audit: type=1327 audit(1719907101.752:611): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636365356533616662316665323464386430373832643735313533 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.828626 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.828771 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.828797 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.839688 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.860414 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.860525 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.882508 kernel: audit: type=1400 audit(1719907101.752:612): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit: BPF prog-id=95 op=LOAD Jul 2 07:58:21.752000 audit[3140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9f58 items=0 ppid=2940 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636365356533616662316665323464386430373832643735313533 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit: BPF prog-id=96 op=LOAD Jul 2 07:58:21.752000 audit[3140]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9fa8 items=0 ppid=2940 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636365356533616662316665323464386430373832643735313533 Jul 2 07:58:21.752000 audit: BPF prog-id=96 op=UNLOAD Jul 2 07:58:21.752000 audit: BPF prog-id=95 op=UNLOAD Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.752000 audit: BPF prog-id=97 op=LOAD Jul 2 07:58:21.752000 audit[3140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a8038 items=0 ppid=2940 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636365356533616662316665323464386430373832643735313533 Jul 2 07:58:22.169493 kubelet[1999]: E0702 07:58:22.169421 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:22.373553 kubelet[1999]: I0702 07:58:22.373511 1999 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:58:22.373553 kubelet[1999]: I0702 07:58:22.373562 1999 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:58:22.405667 kubelet[1999]: I0702 07:58:22.405621 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-fcpmm" podStartSLOduration=39.331399124 podStartE2EDuration="47.405581749s" podCreationTimestamp="2024-07-02 07:57:35 +0000 UTC" firstStartedPulling="2024-07-02 07:58:13.589850337 +0000 UTC m=+39.224355859" lastFinishedPulling="2024-07-02 07:58:21.664032962 +0000 UTC m=+47.298538484" observedRunningTime="2024-07-02 07:58:22.405452944 +0000 UTC m=+48.039958566" watchObservedRunningTime="2024-07-02 07:58:22.405581749 +0000 UTC m=+48.040087271" Jul 2 07:58:22.405934 kubelet[1999]: I0702 07:58:22.405832 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-8hjcg" podStartSLOduration=19.179782879 podStartE2EDuration="25.405799259s" podCreationTimestamp="2024-07-02 07:57:57 +0000 UTC" firstStartedPulling="2024-07-02 07:58:13.679436038 +0000 UTC m=+39.313941560" lastFinishedPulling="2024-07-02 07:58:19.905452418 +0000 UTC m=+45.539957940" observedRunningTime="2024-07-02 07:58:20.400418574 +0000 UTC m=+46.034924096" watchObservedRunningTime="2024-07-02 07:58:22.405799259 +0000 UTC m=+48.040304781" Jul 2 07:58:23.170710 kubelet[1999]: E0702 07:58:23.170639 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:24.171301 kubelet[1999]: E0702 07:58:24.171235 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:25.171767 kubelet[1999]: E0702 07:58:25.171700 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:26.172725 kubelet[1999]: E0702 07:58:26.172665 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:27.173073 kubelet[1999]: E0702 07:58:27.173017 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:28.147841 kernel: kauditd_printk_skb: 33 callbacks suppressed Jul 2 07:58:28.147987 kernel: audit: type=1325 audit(1719907108.141:617): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.141000 audit[3206]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.157681 kernel: audit: type=1300 audit(1719907108.141:617): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc5ee56910 a2=0 a3=7ffc5ee568fc items=0 ppid=2226 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.141000 audit[3206]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc5ee56910 a2=0 a3=7ffc5ee568fc items=0 ppid=2226 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.174331 kubelet[1999]: I0702 07:58:28.174278 1999 topology_manager.go:215] "Topology Admit Handler" podUID="9c4df214-aca2-4bb0-8ce6-ce9971aa2bde" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 07:58:28.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.175548 kubelet[1999]: E0702 07:58:28.175525 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:28.180043 systemd[1]: Created slice kubepods-besteffort-pod9c4df214_aca2_4bb0_8ce6_ce9971aa2bde.slice. Jul 2 07:58:28.172000 audit[3206]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.194220 kernel: audit: type=1327 audit(1719907108.141:617): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.194340 kernel: audit: type=1325 audit(1719907108.172:618): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.194366 kernel: audit: type=1300 audit(1719907108.172:618): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc5ee56910 a2=0 a3=0 items=0 ppid=2226 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.172000 audit[3206]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc5ee56910 a2=0 a3=0 items=0 ppid=2226 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.220273 kernel: audit: type=1327 audit(1719907108.172:618): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.226000 audit[3211]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.226000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff20ff0910 a2=0 a3=7fff20ff08fc items=0 ppid=2226 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.248918 kubelet[1999]: I0702 07:58:28.248888 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-btgp5\" (UniqueName: \"kubernetes.io/projected/9c4df214-aca2-4bb0-8ce6-ce9971aa2bde-kube-api-access-btgp5\") pod \"nfs-server-provisioner-0\" (UID: \"9c4df214-aca2-4bb0-8ce6-ce9971aa2bde\") " pod="default/nfs-server-provisioner-0" Jul 2 07:58:28.249128 kubelet[1999]: I0702 07:58:28.249117 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/9c4df214-aca2-4bb0-8ce6-ce9971aa2bde-data\") pod \"nfs-server-provisioner-0\" (UID: \"9c4df214-aca2-4bb0-8ce6-ce9971aa2bde\") " pod="default/nfs-server-provisioner-0" Jul 2 07:58:28.254066 kernel: audit: type=1325 audit(1719907108.226:619): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.254161 kernel: audit: type=1300 audit(1719907108.226:619): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff20ff0910 a2=0 a3=7fff20ff08fc items=0 ppid=2226 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.254191 kernel: audit: type=1327 audit(1719907108.226:619): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.227000 audit[3211]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.263673 kernel: audit: type=1325 audit(1719907108.227:620): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:28.227000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff20ff0910 a2=0 a3=0 items=0 ppid=2226 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:28.484743 env[1426]: time="2024-07-02T07:58:28.484571766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9c4df214-aca2-4bb0-8ce6-ce9971aa2bde,Namespace:default,Attempt:0,}" Jul 2 07:58:28.637310 systemd-networkd[1582]: cali60e51b789ff: Link UP Jul 2 07:58:28.647692 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:28.647805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 07:58:28.650808 systemd-networkd[1582]: cali60e51b789ff: Gained carrier Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.552 [INFO][3214] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 9c4df214-aca2-4bb0-8ce6-ce9971aa2bde 1254 0 2024-07-02 07:58:28 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.552 [INFO][3214] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.586 [INFO][3226] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" HandleID="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.607 [INFO][3226] ipam_plugin.go 264: Auto assigning IP ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" HandleID="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dded0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 07:58:28.586213192 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.607 [INFO][3226] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.607 [INFO][3226] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.607 [INFO][3226] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.609 [INFO][3226] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.613 [INFO][3226] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.617 [INFO][3226] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.619 [INFO][3226] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.621 [INFO][3226] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.621 [INFO][3226] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.622 [INFO][3226] ipam.go 1685: Creating new handle: k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.626 [INFO][3226] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.631 [INFO][3226] ipam.go 1216: Successfully claimed IPs: [192.168.17.195/26] block=192.168.17.192/26 handle="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.631 [INFO][3226] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.195/26] handle="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" host="10.200.8.13" Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.631 [INFO][3226] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:28.659420 env[1426]: 2024-07-02 07:58:28.631 [INFO][3226] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.195/26] IPv6=[] ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" HandleID="k8s-pod-network.309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.660441 env[1426]: 2024-07-02 07:58:28.632 [INFO][3214] k8s.go 386: Populated endpoint ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9c4df214-aca2-4bb0-8ce6-ce9971aa2bde", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:28.660441 env[1426]: 2024-07-02 07:58:28.633 [INFO][3214] k8s.go 387: Calico CNI using IPs: [192.168.17.195/32] ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.660441 env[1426]: 2024-07-02 07:58:28.633 [INFO][3214] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.660441 env[1426]: 2024-07-02 07:58:28.650 [INFO][3214] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.660856 env[1426]: 2024-07-02 07:58:28.651 [INFO][3214] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9c4df214-aca2-4bb0-8ce6-ce9971aa2bde", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"f6:bd:c5:6d:d8:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:28.660856 env[1426]: 2024-07-02 07:58:28.657 [INFO][3214] k8s.go 500: Wrote updated endpoint to datastore ContainerID="309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:28.672000 audit[3245]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:28.672000 audit[3245]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff0a5a25c0 a2=0 a3=7fff0a5a25ac items=0 ppid=2666 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:28.682415 env[1426]: time="2024-07-02T07:58:28.682335893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:28.682415 env[1426]: time="2024-07-02T07:58:28.682372195Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:28.682415 env[1426]: time="2024-07-02T07:58:28.682386595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:28.683253 env[1426]: time="2024-07-02T07:58:28.683186428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c pid=3253 runtime=io.containerd.runc.v2 Jul 2 07:58:28.699355 systemd[1]: Started cri-containerd-309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c.scope. Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit: BPF prog-id=98 op=LOAD Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3253 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330396336346137666263393736653965656332363335323934313338 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3253 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330396336346137666263393736653965656332363335323934313338 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.715000 audit: BPF prog-id=99 op=LOAD Jul 2 07:58:28.715000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000231070 items=0 ppid=3253 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330396336346137666263393736653965656332363335323934313338 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit: BPF prog-id=100 op=LOAD Jul 2 07:58:28.716000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002310b8 items=0 ppid=3253 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330396336346137666263393736653965656332363335323934313338 Jul 2 07:58:28.716000 audit: BPF prog-id=100 op=UNLOAD Jul 2 07:58:28.716000 audit: BPF prog-id=99 op=UNLOAD Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.716000 audit: BPF prog-id=101 op=LOAD Jul 2 07:58:28.716000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002314c8 items=0 ppid=3253 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330396336346137666263393736653965656332363335323934313338 Jul 2 07:58:28.746669 env[1426]: time="2024-07-02T07:58:28.746547300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9c4df214-aca2-4bb0-8ce6-ce9971aa2bde,Namespace:default,Attempt:0,} returns sandbox id \"309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c\"" Jul 2 07:58:28.750283 env[1426]: time="2024-07-02T07:58:28.750255250Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 07:58:29.176098 kubelet[1999]: E0702 07:58:29.176038 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:30.175915 systemd-networkd[1582]: cali60e51b789ff: Gained IPv6LL Jul 2 07:58:30.177065 kubelet[1999]: E0702 07:58:30.176950 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:31.178060 kubelet[1999]: E0702 07:58:31.177994 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:31.505806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2981627000.mount: Deactivated successfully. Jul 2 07:58:32.179040 kubelet[1999]: E0702 07:58:32.178961 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:33.179890 kubelet[1999]: E0702 07:58:33.179829 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:34.128843 env[1426]: time="2024-07-02T07:58:34.128769859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:34.134740 env[1426]: time="2024-07-02T07:58:34.134685579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:34.139182 env[1426]: time="2024-07-02T07:58:34.139140545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:34.142975 env[1426]: time="2024-07-02T07:58:34.142933386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:34.143574 env[1426]: time="2024-07-02T07:58:34.143533209Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 07:58:34.146382 env[1426]: time="2024-07-02T07:58:34.146349113Z" level=info msg="CreateContainer within sandbox \"309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 07:58:34.171671 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2248369516.mount: Deactivated successfully. Jul 2 07:58:34.180530 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3240705586.mount: Deactivated successfully. Jul 2 07:58:34.180889 kubelet[1999]: E0702 07:58:34.180641 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:34.193991 env[1426]: time="2024-07-02T07:58:34.193933684Z" level=info msg="CreateContainer within sandbox \"309c64a7fbc976e9eec26352941387ab35af8199b7cc56b20aad00e666a8f70c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3464b56e9e6aa7c3def7759c305d4633e20e5c10d3750722c740a3670105cc94\"" Jul 2 07:58:34.194901 env[1426]: time="2024-07-02T07:58:34.194862919Z" level=info msg="StartContainer for \"3464b56e9e6aa7c3def7759c305d4633e20e5c10d3750722c740a3670105cc94\"" Jul 2 07:58:34.216435 systemd[1]: Started cri-containerd-3464b56e9e6aa7c3def7759c305d4633e20e5c10d3750722c740a3670105cc94.scope. Jul 2 07:58:34.237608 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 07:58:34.237768 kernel: audit: type=1400 audit(1719907114.232:640): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.260607 kernel: audit: type=1400 audit(1719907114.232:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.260772 kernel: audit: type=1400 audit(1719907114.232:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.272253 kernel: audit: type=1400 audit(1719907114.232:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.285234 kernel: audit: type=1400 audit(1719907114.232:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.296732 kernel: audit: type=1400 audit(1719907114.232:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.320362 kernel: audit: type=1400 audit(1719907114.232:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.320501 kernel: audit: type=1400 audit(1719907114.232:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.344484 kernel: audit: type=1400 audit(1719907114.232:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.344610 kernel: audit: type=1400 audit(1719907114.271:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.271000 audit: BPF prog-id=102 op=LOAD Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3253 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363462353665396536616137633364656637373539633330356434 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3253 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363462353665396536616137633364656637373539633330356434 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.279000 audit: BPF prog-id=103 op=LOAD Jul 2 07:58:34.279000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003828b0 items=0 ppid=3253 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363462353665396536616137633364656637373539633330356434 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.295000 audit: BPF prog-id=104 op=LOAD Jul 2 07:58:34.295000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003828f8 items=0 ppid=3253 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363462353665396536616137633364656637373539633330356434 Jul 2 07:58:34.307000 audit: BPF prog-id=104 op=UNLOAD Jul 2 07:58:34.307000 audit: BPF prog-id=103 op=UNLOAD Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:34.307000 audit: BPF prog-id=105 op=LOAD Jul 2 07:58:34.307000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382d08 items=0 ppid=3253 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363462353665396536616137633364656637373539633330356434 Jul 2 07:58:34.381494 env[1426]: time="2024-07-02T07:58:34.381369858Z" level=info msg="StartContainer for \"3464b56e9e6aa7c3def7759c305d4633e20e5c10d3750722c740a3670105cc94\" returns successfully" Jul 2 07:58:34.411000 audit[3334]: AVC avc: denied { search } for pid=3334 comm="rpcbind" name="crypto" dev="proc" ino=26221 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:34.411000 audit[3334]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe59ac7d0c0 a2=0 a3=0 items=0 ppid=3316 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 key=(null) Jul 2 07:58:34.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 07:58:34.455000 audit[3339]: AVC avc: denied { search } for pid=3339 comm="dbus-daemon" name="crypto" dev="proc" ino=26221 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:34.455000 audit[3339]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9e79b7a0c0 a2=0 a3=0 items=0 ppid=3316 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 key=(null) Jul 2 07:58:34.455000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:58:34.459149 kubelet[1999]: I0702 07:58:34.459109 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.064775351 podStartE2EDuration="6.459055949s" podCreationTimestamp="2024-07-02 07:58:28 +0000 UTC" firstStartedPulling="2024-07-02 07:58:28.749666026 +0000 UTC m=+54.384171548" lastFinishedPulling="2024-07-02 07:58:34.143946624 +0000 UTC m=+59.778452146" observedRunningTime="2024-07-02 07:58:34.458977046 +0000 UTC m=+60.093482668" watchObservedRunningTime="2024-07-02 07:58:34.459055949 +0000 UTC m=+60.093574871" Jul 2 07:58:34.459000 audit[3340]: AVC avc: denied { watch } for pid=3340 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c340,c717 tclass=dir permissive=0 Jul 2 07:58:34.459000 audit[3340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5621f352b590 a2=2c8 a3=7ffd99f9083c items=0 ppid=3316 pid=3340 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 key=(null) Jul 2 07:58:34.459000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:58:34.466000 audit[3341]: AVC avc: denied { read } for pid=3341 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26259 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 07:58:34.466000 audit[3341]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb69e785320 a1=80000 a2=d a3=7fffe855a290 items=0 ppid=3316 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 key=(null) Jul 2 07:58:34.466000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:58:34.468000 audit[3341]: AVC avc: denied { search } for pid=3341 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26221 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:34.468000 audit[3341]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb69dcd90c0 a2=0 a3=0 items=0 ppid=3316 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c717 key=(null) Jul 2 07:58:34.468000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:58:34.470000 audit[3343]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.470000 audit[3343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd6026eca0 a2=0 a3=7ffd6026ec8c items=0 ppid=2226 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:34.474000 audit[3343]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:34.474000 audit[3343]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd6026eca0 a2=0 a3=7ffd6026ec8c items=0 ppid=2226 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:34.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:35.133002 kubelet[1999]: E0702 07:58:35.132940 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.181489 kubelet[1999]: E0702 07:58:35.181432 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.263870 env[1426]: time="2024-07-02T07:58:35.263809360Z" level=info msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.302 [WARNING][3368] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--fcpmm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2b74567-ff4c-415f-9bbd-3c8a913fb76e", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c", Pod:"csi-node-driver-fcpmm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9124a3cf195", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.303 [INFO][3368] k8s.go 608: Cleaning up netns ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.303 [INFO][3368] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" iface="eth0" netns="" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.303 [INFO][3368] k8s.go 615: Releasing IP address(es) ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.303 [INFO][3368] utils.go 188: Calico CNI releasing IP address ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.322 [INFO][3374] ipam_plugin.go 411: Releasing address using handleID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.322 [INFO][3374] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.322 [INFO][3374] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.332 [WARNING][3374] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.332 [INFO][3374] ipam_plugin.go 439: Releasing address using workloadID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.334 [INFO][3374] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:35.336979 env[1426]: 2024-07-02 07:58:35.336 [INFO][3368] k8s.go 621: Teardown processing complete. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.337633 env[1426]: time="2024-07-02T07:58:35.337011947Z" level=info msg="TearDown network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" successfully" Jul 2 07:58:35.337633 env[1426]: time="2024-07-02T07:58:35.337053348Z" level=info msg="StopPodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" returns successfully" Jul 2 07:58:35.337923 env[1426]: time="2024-07-02T07:58:35.337890579Z" level=info msg="RemovePodSandbox for \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" Jul 2 07:58:35.338013 env[1426]: time="2024-07-02T07:58:35.337930580Z" level=info msg="Forcibly stopping sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\"" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.373 [WARNING][3392] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--fcpmm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2b74567-ff4c-415f-9bbd-3c8a913fb76e", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"6ff3c55de3d8b94a7c103b95e2463596fbe20a3067cfe553fc08795ba154761c", Pod:"csi-node-driver-fcpmm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9124a3cf195", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.373 [INFO][3392] k8s.go 608: Cleaning up netns ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.373 [INFO][3392] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" iface="eth0" netns="" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.373 [INFO][3392] k8s.go 615: Releasing IP address(es) ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.373 [INFO][3392] utils.go 188: Calico CNI releasing IP address ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.396 [INFO][3398] ipam_plugin.go 411: Releasing address using handleID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.396 [INFO][3398] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.396 [INFO][3398] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.410 [WARNING][3398] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.410 [INFO][3398] ipam_plugin.go 439: Releasing address using workloadID ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" HandleID="k8s-pod-network.609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Workload="10.200.8.13-k8s-csi--node--driver--fcpmm-eth0" Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.416 [INFO][3398] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:35.421227 env[1426]: 2024-07-02 07:58:35.420 [INFO][3392] k8s.go 621: Teardown processing complete. ContainerID="609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c" Jul 2 07:58:35.421970 env[1426]: time="2024-07-02T07:58:35.421260239Z" level=info msg="TearDown network for sandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" successfully" Jul 2 07:58:35.428361 env[1426]: time="2024-07-02T07:58:35.428319898Z" level=info msg="RemovePodSandbox \"609cd579dcb3920f86ee3ae60e33667feab3312952b2e05f889857a88045775c\" returns successfully" Jul 2 07:58:35.428986 env[1426]: time="2024-07-02T07:58:35.428955121Z" level=info msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.467 [WARNING][3417] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b", Pod:"nginx-deployment-6d5f899847-8hjcg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali86a0f049aa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.467 [INFO][3417] k8s.go 608: Cleaning up netns ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.467 [INFO][3417] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" iface="eth0" netns="" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.467 [INFO][3417] k8s.go 615: Releasing IP address(es) ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.467 [INFO][3417] utils.go 188: Calico CNI releasing IP address ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.487 [INFO][3424] ipam_plugin.go 411: Releasing address using handleID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.487 [INFO][3424] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.487 [INFO][3424] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.494 [WARNING][3424] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.494 [INFO][3424] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.496 [INFO][3424] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:35.498620 env[1426]: 2024-07-02 07:58:35.497 [INFO][3417] k8s.go 621: Teardown processing complete. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.499379 env[1426]: time="2024-07-02T07:58:35.498675480Z" level=info msg="TearDown network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" successfully" Jul 2 07:58:35.499379 env[1426]: time="2024-07-02T07:58:35.498717482Z" level=info msg="StopPodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" returns successfully" Jul 2 07:58:35.499379 env[1426]: time="2024-07-02T07:58:35.499252402Z" level=info msg="RemovePodSandbox for \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" Jul 2 07:58:35.499379 env[1426]: time="2024-07-02T07:58:35.499292903Z" level=info msg="Forcibly stopping sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\"" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.533 [WARNING][3442] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"36cedde1-bd56-4ac1-a0fb-b05e76e0e71e", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"5b9065f4b514a10214a01f74f72fe894302763a775c274de40d761b398280d0b", Pod:"nginx-deployment-6d5f899847-8hjcg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali86a0f049aa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.533 [INFO][3442] k8s.go 608: Cleaning up netns ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.533 [INFO][3442] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" iface="eth0" netns="" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.533 [INFO][3442] k8s.go 615: Releasing IP address(es) ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.533 [INFO][3442] utils.go 188: Calico CNI releasing IP address ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.552 [INFO][3448] ipam_plugin.go 411: Releasing address using handleID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.552 [INFO][3448] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.552 [INFO][3448] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.559 [WARNING][3448] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.559 [INFO][3448] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" HandleID="k8s-pod-network.8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--8hjcg-eth0" Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.561 [INFO][3448] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:35.562948 env[1426]: 2024-07-02 07:58:35.561 [INFO][3442] k8s.go 621: Teardown processing complete. ContainerID="8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490" Jul 2 07:58:35.563675 env[1426]: time="2024-07-02T07:58:35.562984041Z" level=info msg="TearDown network for sandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" successfully" Jul 2 07:58:35.570490 env[1426]: time="2024-07-02T07:58:35.570445015Z" level=info msg="RemovePodSandbox \"8b4875934df5ebc517d01c784b85d32abcf56aacdd95b883d853ceccc02aa490\" returns successfully" Jul 2 07:58:36.182297 kubelet[1999]: E0702 07:58:36.182236 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:37.183256 kubelet[1999]: E0702 07:58:37.183196 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:38.184033 kubelet[1999]: E0702 07:58:38.183978 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:39.184294 kubelet[1999]: E0702 07:58:39.184227 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:40.185173 kubelet[1999]: E0702 07:58:40.185062 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:41.185834 kubelet[1999]: E0702 07:58:41.185767 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:42.186823 kubelet[1999]: E0702 07:58:42.186746 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:43.187362 kubelet[1999]: E0702 07:58:43.187293 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:44.188258 kubelet[1999]: E0702 07:58:44.188177 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:45.188928 kubelet[1999]: E0702 07:58:45.188865 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:46.189864 kubelet[1999]: E0702 07:58:46.189811 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:47.190324 kubelet[1999]: E0702 07:58:47.190261 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:48.191532 kubelet[1999]: E0702 07:58:48.191471 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:49.192388 kubelet[1999]: E0702 07:58:49.192332 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:50.192872 kubelet[1999]: E0702 07:58:50.192818 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:51.193844 kubelet[1999]: E0702 07:58:51.193780 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:52.194735 kubelet[1999]: E0702 07:58:52.194681 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:53.195463 kubelet[1999]: E0702 07:58:53.195403 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:54.196220 kubelet[1999]: E0702 07:58:54.196159 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:55.132889 kubelet[1999]: E0702 07:58:55.132828 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:55.197236 kubelet[1999]: E0702 07:58:55.197179 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:56.197788 kubelet[1999]: E0702 07:58:56.197728 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:57.198298 kubelet[1999]: E0702 07:58:57.198240 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:57.868620 systemd[1]: run-containerd-runc-k8s.io-cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585-runc.MOimp8.mount: Deactivated successfully. Jul 2 07:58:58.199518 kubelet[1999]: E0702 07:58:58.199458 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:58.768045 kubelet[1999]: I0702 07:58:58.767996 1999 topology_manager.go:215] "Topology Admit Handler" podUID="27c83636-6b13-4130-9618-4519f94e6218" podNamespace="default" podName="test-pod-1" Jul 2 07:58:58.773542 systemd[1]: Created slice kubepods-besteffort-pod27c83636_6b13_4130_9618_4519f94e6218.slice. Jul 2 07:58:58.829018 kubelet[1999]: I0702 07:58:58.828969 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6fcd\" (UniqueName: \"kubernetes.io/projected/27c83636-6b13-4130-9618-4519f94e6218-kube-api-access-q6fcd\") pod \"test-pod-1\" (UID: \"27c83636-6b13-4130-9618-4519f94e6218\") " pod="default/test-pod-1" Jul 2 07:58:58.829242 kubelet[1999]: I0702 07:58:58.829080 1999 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-fc59dcf6-c188-461c-ac75-3bb44c628857\" (UniqueName: \"kubernetes.io/nfs/27c83636-6b13-4130-9618-4519f94e6218-pvc-fc59dcf6-c188-461c-ac75-3bb44c628857\") pod \"test-pod-1\" (UID: \"27c83636-6b13-4130-9618-4519f94e6218\") " pod="default/test-pod-1" Jul 2 07:58:58.971265 kernel: Failed to create system directory netfs Jul 2 07:58:58.971428 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 07:58:58.971453 kernel: audit: type=1400 audit(1719907138.964:665): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.964000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.989267 kernel: Failed to create system directory netfs Jul 2 07:58:58.989402 kernel: audit: type=1400 audit(1719907138.964:665): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.964000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.007192 kernel: Failed to create system directory netfs Jul 2 07:58:59.007341 kernel: audit: type=1400 audit(1719907138.964:665): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.964000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.024637 kernel: Failed to create system directory netfs Jul 2 07:58:59.024791 kernel: audit: type=1400 audit(1719907138.964:665): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.964000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:58.964000 audit[3516]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5651977675e0 a1=153bc a2=5651963622b0 a3=5 items=0 ppid=480 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:58.964000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:58:59.065571 kernel: audit: type=1300 audit(1719907138.964:665): arch=c000003e syscall=175 success=yes exit=0 a0=5651977675e0 a1=153bc a2=5651963622b0 a3=5 items=0 ppid=480 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:59.065732 kernel: audit: type=1327 audit(1719907138.964:665): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:58:59.088903 kernel: Failed to create system directory fscache Jul 2 07:58:59.089070 kernel: audit: type=1400 audit(1719907139.066:666): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.089100 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.093964 kernel: audit: type=1400 audit(1719907139.066:666): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.110137 kernel: Failed to create system directory fscache Jul 2 07:58:59.110237 kernel: audit: type=1400 audit(1719907139.066:666): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.126939 kernel: Failed to create system directory fscache Jul 2 07:58:59.127039 kernel: audit: type=1400 audit(1719907139.066:666): avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.140439 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.146766 kernel: Failed to create system directory fscache Jul 2 07:58:59.146862 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.154021 kernel: Failed to create system directory fscache Jul 2 07:58:59.154106 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.160080 kernel: Failed to create system directory fscache Jul 2 07:58:59.160150 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.166018 kernel: Failed to create system directory fscache Jul 2 07:58:59.166092 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.169720 kernel: Failed to create system directory fscache Jul 2 07:58:59.066000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.066000 audit[3516]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56519797c9c0 a1=4c0fc a2=5651963622b0 a3=5 items=0 ppid=480 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:59.175672 kernel: FS-Cache: Loaded Jul 2 07:58:59.066000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:58:59.200071 kubelet[1999]: E0702 07:58:59.200027 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.221978 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.222083 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.222106 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.227484 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.227561 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.233106 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.233166 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.238775 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.238842 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.244158 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.244231 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.249546 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.249618 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.255211 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.257989 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.258064 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.264673 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.264738 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.273329 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.273401 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.273429 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.277543 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.278671 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.283268 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.283323 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.287997 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.288053 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.290496 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.295120 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.295177 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.297666 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.302062 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.302117 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.306910 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.307001 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.311807 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.311885 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.316235 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.316289 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.320430 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.320494 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.323670 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.325659 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.329903 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.329952 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.334255 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.334302 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.338555 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.338594 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.343083 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.343155 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.347717 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.347799 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.352118 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.352187 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.356528 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.356593 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.361049 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.361112 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.365495 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.365545 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.369917 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.369984 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.375946 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.377134 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.380276 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.380337 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.384759 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.384816 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.389345 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.389405 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.393865 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.393930 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.398082 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.398131 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.402764 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.402817 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.407089 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.407145 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.411509 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.411566 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.415978 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.416025 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.420709 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.420842 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.425395 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.425466 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.428388 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.430702 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.434958 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.435028 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.439341 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.439387 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.443983 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.444045 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.446214 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.448307 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.450415 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.452516 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.454630 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.456899 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.459000 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.461112 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.465751 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.465800 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.469995 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.470051 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.473773 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.476873 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.476931 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.479431 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.487840 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.487920 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.492189 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.492230 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.495663 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.496690 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.501282 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.501338 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.505718 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.505765 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.510314 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.510375 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.514761 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.514802 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.200000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.519224 kernel: Failed to create system directory sunrpc Jul 2 07:58:59.531147 kernel: RPC: Registered named UNIX socket transport module. Jul 2 07:58:59.531226 kernel: RPC: Registered udp transport module. Jul 2 07:58:59.531261 kernel: RPC: Registered tcp transport module. Jul 2 07:58:59.534387 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 07:58:59.200000 audit[3516]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5651979c8ad0 a1=1a7f5c a2=5651963622b0 a3=5 items=6 ppid=480 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:59.200000 audit: CWD cwd="/" Jul 2 07:58:59.200000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PATH item=1 name=(null) inode=27427 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PATH item=2 name=(null) inode=27427 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PATH item=3 name=(null) inode=27428 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PATH item=4 name=(null) inode=27427 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PATH item=5 name=(null) inode=27429 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:59.200000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.589427 kernel: Failed to create system directory nfs Jul 2 07:58:59.589518 kernel: Failed to create system directory nfs Jul 2 07:58:59.589543 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.593546 kernel: Failed to create system directory nfs Jul 2 07:58:59.593603 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.597874 kernel: Failed to create system directory nfs Jul 2 07:58:59.597938 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.603332 kernel: Failed to create system directory nfs Jul 2 07:58:59.603391 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.607830 kernel: Failed to create system directory nfs Jul 2 07:58:59.607881 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.612121 kernel: Failed to create system directory nfs Jul 2 07:58:59.612174 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.616509 kernel: Failed to create system directory nfs Jul 2 07:58:59.616559 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.621104 kernel: Failed to create system directory nfs Jul 2 07:58:59.621178 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.625679 kernel: Failed to create system directory nfs Jul 2 07:58:59.625732 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.629939 kernel: Failed to create system directory nfs Jul 2 07:58:59.629997 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.634341 kernel: Failed to create system directory nfs Jul 2 07:58:59.634395 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.638671 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.640984 kernel: Failed to create system directory nfs Jul 2 07:58:59.641037 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.645213 kernel: Failed to create system directory nfs Jul 2 07:58:59.645268 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.649469 kernel: Failed to create system directory nfs Jul 2 07:58:59.649510 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.653979 kernel: Failed to create system directory nfs Jul 2 07:58:59.654047 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.658484 kernel: Failed to create system directory nfs Jul 2 07:58:59.658537 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.662862 kernel: Failed to create system directory nfs Jul 2 07:58:59.662915 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.667555 kernel: Failed to create system directory nfs Jul 2 07:58:59.667616 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.671981 kernel: Failed to create system directory nfs Jul 2 07:58:59.672047 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.676168 kernel: Failed to create system directory nfs Jul 2 07:58:59.676228 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.680484 kernel: Failed to create system directory nfs Jul 2 07:58:59.680555 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.685030 kernel: Failed to create system directory nfs Jul 2 07:58:59.685093 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.689580 kernel: Failed to create system directory nfs Jul 2 07:58:59.689661 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.693919 kernel: Failed to create system directory nfs Jul 2 07:58:59.693978 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.696090 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.700092 kernel: Failed to create system directory nfs Jul 2 07:58:59.700154 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.704361 kernel: Failed to create system directory nfs Jul 2 07:58:59.704417 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.709713 kernel: Failed to create system directory nfs Jul 2 07:58:59.709774 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.713843 kernel: Failed to create system directory nfs Jul 2 07:58:59.713907 kernel: Failed to create system directory nfs Jul 2 07:58:59.572000 audit[3516]: AVC avc: denied { confidentiality } for pid=3516 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.572000 audit[3516]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565197be9790 a1=16dba4 a2=5651963622b0 a3=5 items=0 ppid=480 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:59.736676 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 07:58:59.572000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.789756 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.789850 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.789876 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.794003 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.794667 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.798660 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.798703 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.800791 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.805007 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.805062 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.809441 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.809500 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.814395 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.814450 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.818845 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.818883 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.824135 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.824191 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.828623 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.828682 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.833062 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.833103 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.835419 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.839774 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.839819 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.843948 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.843990 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.848150 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.848214 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.852463 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.852522 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.856658 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.856706 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.861150 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.861212 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.865620 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.865681 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.870359 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.870415 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.872681 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.877150 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.877196 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.881438 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.881484 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.884698 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.888781 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.888830 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.893211 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.895382 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.895427 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.899709 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.899753 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.903924 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.903970 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.908133 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.908180 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.912314 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.912353 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.914357 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.916821 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.919062 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.921390 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.923484 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.925500 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.928993 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.931189 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.935605 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.935669 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.942556 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.942603 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.942665 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.946868 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.946938 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.951344 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.951438 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.953718 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.956702 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.960269 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.960318 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.962447 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.966780 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.966835 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.970976 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.971048 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.973700 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.977202 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.977255 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.979671 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.983849 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.983926 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.988014 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.988068 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:58:59.992190 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.992245 kernel: Failed to create system directory nfs4 Jul 2 07:58:59.768000 audit[3521]: AVC avc: denied { confidentiality } for pid=3521 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.127397 kernel: NFS: Registering the id_resolver key type Jul 2 07:59:00.127545 kernel: Key type id_resolver registered Jul 2 07:59:00.127602 kernel: Key type id_legacy registered Jul 2 07:58:59.768000 audit[3521]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fead3978010 a1=20890c a2=5607deec82b0 a3=5 items=0 ppid=480 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:59.768000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.155125 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.155231 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.155257 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.159823 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.159867 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.164471 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.165209 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.169476 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.169533 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.173970 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.174036 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.178356 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.178420 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.183480 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.183537 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.190253 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.190316 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.190339 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.192618 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.194795 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.197078 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.201489 kubelet[1999]: E0702 07:59:00.201428 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:00.201984 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.202015 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.204076 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.206223 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.208439 kernel: Failed to create system directory rpcgss Jul 2 07:59:00.143000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:00.143000 audit[3523]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8612b8c010 a1=70bec a2=561f5bf942b0 a3=5 items=0 ppid=480 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.143000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 07:59:00.421557 nfsidmap[3529]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-a4d27d43f9' Jul 2 07:59:00.445097 nfsidmap[3530]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-a4d27d43f9' Jul 2 07:59:00.454000 audit[1539]: AVC avc: denied { watch_reads } for pid=1539 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.454000 audit[1539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ef6f2ad00 a2=10 a3=d3efa6e0f02a8ade items=0 ppid=1 pid=1539 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.454000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:00.454000 audit[1539]: AVC avc: denied { watch_reads } for pid=1539 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.454000 audit[1539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ef6f2ad00 a2=10 a3=d3efa6e0f02a8ade items=0 ppid=1 pid=1539 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.454000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:00.454000 audit[1539]: AVC avc: denied { watch_reads } for pid=1539 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.454000 audit[1539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ef6f2ad00 a2=10 a3=d3efa6e0f02a8ade items=0 ppid=1 pid=1539 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.454000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:00.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:00.576619 env[1426]: time="2024-07-02T07:59:00.576555393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:27c83636-6b13-4130-9618-4519f94e6218,Namespace:default,Attempt:0,}" Jul 2 07:59:00.709776 systemd-networkd[1582]: cali5ec59c6bf6e: Link UP Jul 2 07:59:00.713036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:59:00.713264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 07:59:00.715925 systemd-networkd[1582]: cali5ec59c6bf6e: Gained carrier Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.642 [INFO][3532] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-test--pod--1-eth0 default 27c83636-6b13-4130-9618-4519f94e6218 1354 0 2024-07-02 07:58:29 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.643 [INFO][3532] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.668 [INFO][3543] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" HandleID="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Workload="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.678 [INFO][3543] ipam_plugin.go 264: Auto assigning IP ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" HandleID="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Workload="10.200.8.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000116660), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"test-pod-1", "timestamp":"2024-07-02 07:59:00.668357477 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.678 [INFO][3543] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.678 [INFO][3543] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.678 [INFO][3543] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.680 [INFO][3543] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.684 [INFO][3543] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.688 [INFO][3543] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.690 [INFO][3543] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.691 [INFO][3543] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.691 [INFO][3543] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.693 [INFO][3543] ipam.go 1685: Creating new handle: k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.697 [INFO][3543] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.701 [INFO][3543] ipam.go 1216: Successfully claimed IPs: [192.168.17.196/26] block=192.168.17.192/26 handle="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.701 [INFO][3543] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.196/26] handle="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" host="10.200.8.13" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.701 [INFO][3543] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.701 [INFO][3543] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.196/26] IPv6=[] ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" HandleID="k8s-pod-network.0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Workload="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.702 [INFO][3532] k8s.go 386: Populated endpoint ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"27c83636-6b13-4130-9618-4519f94e6218", ResourceVersion:"1354", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:00.726262 env[1426]: 2024-07-02 07:59:00.702 [INFO][3532] k8s.go 387: Calico CNI using IPs: [192.168.17.196/32] ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.727447 env[1426]: 2024-07-02 07:59:00.702 [INFO][3532] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.727447 env[1426]: 2024-07-02 07:59:00.716 [INFO][3532] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.727447 env[1426]: 2024-07-02 07:59:00.717 [INFO][3532] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"27c83636-6b13-4130-9618-4519f94e6218", ResourceVersion:"1354", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ee:6a:e6:d2:12:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:00.727447 env[1426]: 2024-07-02 07:59:00.723 [INFO][3532] k8s.go 500: Wrote updated endpoint to datastore ContainerID="0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Jul 2 07:59:00.737000 audit[3558]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:59:00.737000 audit[3558]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffeb70616c0 a2=0 a3=7ffeb70616ac items=0 ppid=2666 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:59:00.750882 env[1426]: time="2024-07-02T07:59:00.750621694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:59:00.750882 env[1426]: time="2024-07-02T07:59:00.750696496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:59:00.750882 env[1426]: time="2024-07-02T07:59:00.750713696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:59:00.751601 env[1426]: time="2024-07-02T07:59:00.751542520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f pid=3570 runtime=io.containerd.runc.v2 Jul 2 07:59:00.768673 systemd[1]: Started cri-containerd-0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f.scope. Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.782000 audit: BPF prog-id=106 op=LOAD Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3570 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353163623738376439326461303366633833376533346237623734 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3570 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353163623738376439326461303366633833376533346237623734 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.783000 audit: BPF prog-id=107 op=LOAD Jul 2 07:59:00.783000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cc3a0 items=0 ppid=3570 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353163623738376439326461303366633833376533346237623734 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit: BPF prog-id=108 op=LOAD Jul 2 07:59:00.784000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cc3e8 items=0 ppid=3570 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353163623738376439326461303366633833376533346237623734 Jul 2 07:59:00.784000 audit: BPF prog-id=108 op=UNLOAD Jul 2 07:59:00.784000 audit: BPF prog-id=107 op=UNLOAD Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:00.784000 audit: BPF prog-id=109 op=LOAD Jul 2 07:59:00.784000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cc7f8 items=0 ppid=3570 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353163623738376439326461303366633833376533346237623734 Jul 2 07:59:00.818688 env[1426]: time="2024-07-02T07:59:00.818624408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:27c83636-6b13-4130-9618-4519f94e6218,Namespace:default,Attempt:0,} returns sandbox id \"0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f\"" Jul 2 07:59:00.820714 env[1426]: time="2024-07-02T07:59:00.820609164Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:59:01.202023 kubelet[1999]: E0702 07:59:01.201966 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:01.293581 env[1426]: time="2024-07-02T07:59:01.293530416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:01.299671 env[1426]: time="2024-07-02T07:59:01.299603385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:01.303013 env[1426]: time="2024-07-02T07:59:01.302982880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:01.306385 env[1426]: time="2024-07-02T07:59:01.306350474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:01.307023 env[1426]: time="2024-07-02T07:59:01.306989992Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:59:01.309239 env[1426]: time="2024-07-02T07:59:01.309208854Z" level=info msg="CreateContainer within sandbox \"0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 07:59:01.331526 env[1426]: time="2024-07-02T07:59:01.331479576Z" level=info msg="CreateContainer within sandbox \"0e51cb787d92da03fc837e34b7b741f3704da4d6a62cb0aff7f1661b7944a53f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"48ddec989e9898145211dd694f44a2be415cdd785cc2f635ddbf7aa9716578e7\"" Jul 2 07:59:01.332378 env[1426]: time="2024-07-02T07:59:01.332344800Z" level=info msg="StartContainer for \"48ddec989e9898145211dd694f44a2be415cdd785cc2f635ddbf7aa9716578e7\"" Jul 2 07:59:01.348586 systemd[1]: Started cri-containerd-48ddec989e9898145211dd694f44a2be415cdd785cc2f635ddbf7aa9716578e7.scope. Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.361000 audit: BPF prog-id=110 op=LOAD Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3570 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438646465633938396539383938313435323131646436393466343461 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3570 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438646465633938396539383938313435323131646436393466343461 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.362000 audit: BPF prog-id=111 op=LOAD Jul 2 07:59:01.362000 audit[3615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300500 items=0 ppid=3570 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438646465633938396539383938313435323131646436393466343461 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit: BPF prog-id=112 op=LOAD Jul 2 07:59:01.363000 audit[3615]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300548 items=0 ppid=3570 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438646465633938396539383938313435323131646436393466343461 Jul 2 07:59:01.363000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:59:01.363000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { perfmon } for pid=3615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit[3615]: AVC avc: denied { bpf } for pid=3615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.363000 audit: BPF prog-id=113 op=LOAD Jul 2 07:59:01.363000 audit[3615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300958 items=0 ppid=3570 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438646465633938396539383938313435323131646436393466343461 Jul 2 07:59:01.384906 env[1426]: time="2024-07-02T07:59:01.384856567Z" level=info msg="StartContainer for \"48ddec989e9898145211dd694f44a2be415cdd785cc2f635ddbf7aa9716578e7\" returns successfully" Jul 2 07:59:01.510521 kubelet[1999]: I0702 07:59:01.510281 1999 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=32.02308132 podStartE2EDuration="32.51024027s" podCreationTimestamp="2024-07-02 07:58:29 +0000 UTC" firstStartedPulling="2024-07-02 07:59:00.820152151 +0000 UTC m=+86.454657673" lastFinishedPulling="2024-07-02 07:59:01.307311001 +0000 UTC m=+86.941816623" observedRunningTime="2024-07-02 07:59:01.510076965 +0000 UTC m=+87.144582487" watchObservedRunningTime="2024-07-02 07:59:01.51024027 +0000 UTC m=+87.144745792" Jul 2 07:59:01.791893 systemd-networkd[1582]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 07:59:02.202464 kubelet[1999]: E0702 07:59:02.202401 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:03.203588 kubelet[1999]: E0702 07:59:03.203527 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:04.204184 kubelet[1999]: E0702 07:59:04.204112 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:05.204996 kubelet[1999]: E0702 07:59:05.204959 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:06.205400 kubelet[1999]: E0702 07:59:06.205343 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:07.206355 kubelet[1999]: E0702 07:59:07.206289 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:08.206518 kubelet[1999]: E0702 07:59:08.206452 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:09.207263 kubelet[1999]: E0702 07:59:09.207197 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:10.207600 kubelet[1999]: E0702 07:59:10.207532 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:11.208281 kubelet[1999]: E0702 07:59:11.208219 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:12.209031 kubelet[1999]: E0702 07:59:12.208962 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:13.209723 kubelet[1999]: E0702 07:59:13.209670 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:14.210220 kubelet[1999]: E0702 07:59:14.210143 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:15.132781 kubelet[1999]: E0702 07:59:15.132714 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:15.211347 kubelet[1999]: E0702 07:59:15.211284 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:16.212091 kubelet[1999]: E0702 07:59:16.212033 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:17.212765 kubelet[1999]: E0702 07:59:17.212702 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:17.436875 kubelet[1999]: E0702 07:59:17.436817 1999 controller.go:195] "Failed to update lease" err="Put \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:18.213712 kubelet[1999]: E0702 07:59:18.213656 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:18.896279 kubelet[1999]: E0702 07:59:18.896234 1999 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.38:53214->10.200.8.21:2379: read: connection timed out" Jul 2 07:59:19.214808 kubelet[1999]: E0702 07:59:19.214672 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:20.215920 kubelet[1999]: E0702 07:59:20.215855 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:21.216178 kubelet[1999]: E0702 07:59:21.216105 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:22.216914 kubelet[1999]: E0702 07:59:22.216847 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:23.217051 kubelet[1999]: E0702 07:59:23.217002 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:24.217920 kubelet[1999]: E0702 07:59:24.217857 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:25.218540 kubelet[1999]: E0702 07:59:25.218469 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:26.218835 kubelet[1999]: E0702 07:59:26.218773 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:27.219989 kubelet[1999]: E0702 07:59:27.219926 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:27.875878 systemd[1]: run-containerd-runc-k8s.io-cf1e232efdc1abfcc8cf85cf7ebe5ffd06a7f846753199881ac4e64236714585-runc.3nKIDc.mount: Deactivated successfully. Jul 2 07:59:28.220965 kubelet[1999]: E0702 07:59:28.220904 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:28.897070 kubelet[1999]: E0702 07:59:28.896993 1999 controller.go:195] "Failed to update lease" err="Put \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:29.222057 kubelet[1999]: E0702 07:59:29.221907 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:30.222606 kubelet[1999]: E0702 07:59:30.222538 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:31.223319 kubelet[1999]: E0702 07:59:31.223259 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:32.223901 kubelet[1999]: E0702 07:59:32.223839 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:33.224144 kubelet[1999]: E0702 07:59:33.224081 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:34.224930 kubelet[1999]: E0702 07:59:34.224839 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:35.133354 kubelet[1999]: E0702 07:59:35.133295 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:35.225772 kubelet[1999]: E0702 07:59:35.225703 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:36.226024 kubelet[1999]: E0702 07:59:36.225964 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:37.226512 kubelet[1999]: E0702 07:59:37.226444 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:38.227479 kubelet[1999]: E0702 07:59:38.227417 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:38.898157 kubelet[1999]: E0702 07:59:38.898095 1999 controller.go:195] "Failed to update lease" err="Put \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:39.227725 kubelet[1999]: E0702 07:59:39.227565 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:40.227837 kubelet[1999]: E0702 07:59:40.227776 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:41.228932 kubelet[1999]: E0702 07:59:41.228866 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:42.229579 kubelet[1999]: E0702 07:59:42.229513 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:43.230199 kubelet[1999]: E0702 07:59:43.230132 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:44.230682 kubelet[1999]: E0702 07:59:44.230619 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:45.231532 kubelet[1999]: E0702 07:59:45.231476 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:46.232598 kubelet[1999]: E0702 07:59:46.232539 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:47.233179 kubelet[1999]: E0702 07:59:47.233128 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:48.234187 kubelet[1999]: E0702 07:59:48.234124 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:48.898866 kubelet[1999]: E0702 07:59:48.898800 1999 controller.go:195] "Failed to update lease" err="Put \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:48.898866 kubelet[1999]: I0702 07:59:48.898861 1999 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Jul 2 07:59:49.235258 kubelet[1999]: E0702 07:59:49.235104 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:50.235664 kubelet[1999]: E0702 07:59:50.235582 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:51.236128 kubelet[1999]: E0702 07:59:51.236071 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:52.237211 kubelet[1999]: E0702 07:59:52.237143 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:53.238203 kubelet[1999]: E0702 07:59:53.238133 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:54.238773 kubelet[1999]: E0702 07:59:54.238708 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:55.132964 kubelet[1999]: E0702 07:59:55.132903 1999 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:55.239746 kubelet[1999]: E0702 07:59:55.239683 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:56.240604 kubelet[1999]: E0702 07:59:56.240535 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:57.241800 kubelet[1999]: E0702 07:59:57.241732 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:58.146528 kubelet[1999]: E0702 07:59:58.146476 1999 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.8.13\": Get \"https://10.200.8.38:6443/api/v1/nodes/10.200.8.13?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:58.242168 kubelet[1999]: E0702 07:59:58.242097 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:58.899327 kubelet[1999]: E0702 07:59:58.899267 1999 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Jul 2 07:59:59.242407 kubelet[1999]: E0702 07:59:59.242263 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:00.243370 kubelet[1999]: E0702 08:00:00.243308 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:01.243802 kubelet[1999]: E0702 08:00:01.243746 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:02.244558 kubelet[1999]: E0702 08:00:02.244486 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:03.245196 kubelet[1999]: E0702 08:00:03.245129 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:04.246019 kubelet[1999]: E0702 08:00:04.245951 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:05.246663 kubelet[1999]: E0702 08:00:05.246576 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:06.247562 kubelet[1999]: E0702 08:00:06.247497 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:07.248671 kubelet[1999]: E0702 08:00:07.248585 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:08.147225 kubelet[1999]: E0702 08:00:08.147170 1999 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.8.13\": Get \"https://10.200.8.38:6443/api/v1/nodes/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 08:00:08.249830 kubelet[1999]: E0702 08:00:08.249767 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:09.101596 kubelet[1999]: E0702 08:00:09.101536 1999 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Jul 2 08:00:09.250413 kubelet[1999]: E0702 08:00:09.250346 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:10.250933 kubelet[1999]: E0702 08:00:10.250867 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:10.343515 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.343991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.361880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.362281 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.372067 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.372399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.385173 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.385617 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.402622 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.403008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.412540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.412895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.418896 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.425399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.431767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.437993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.465319 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.465637 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.471721 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.476466 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.481140 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.485543 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.490272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.494522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.511863 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.512143 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.516901 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.523045 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.529348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.535609 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.540187 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.544794 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.565969 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.566221 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.566363 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.576664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.576928 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.581128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.585768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.594974 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.607760 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.608038 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.616809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.617078 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.625554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.625812 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.634344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.634576 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.643892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.644134 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.652289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.652520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.660976 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.661202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.670241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.670565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.687307 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.687670 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.687825 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.696162 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.696425 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.705093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.705352 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.714023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.719171 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.719414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.728264 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.728500 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.737052 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.737269 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.745993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.746214 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.760266 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.760500 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.760628 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.769316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.769551 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.778371 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.778620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.787370 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.803107 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.803395 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.803546 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.815316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.815634 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.825560 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.825848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.838008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.838302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.845209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.856533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.856806 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.867296 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.867615 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.876486 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.876743 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.891077 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.891364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.891562 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.901534 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.901819 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.910579 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.910833 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.919527 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.919789 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.924177 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.933011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.933219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.941850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.942068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.950683 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.950897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.960355 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.960573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.970376 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.970726 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.979665 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.979929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.988536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:10.988814 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.003144 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.003496 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.003668 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.012992 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.013318 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.022024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.022342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.031373 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.041418 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.041704 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.041851 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.050268 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.050510 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.059147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.059376 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.068656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.079665 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.079896 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.080039 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.087099 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.087307 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.095822 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.096035 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.104348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.114783 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.114989 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.115181 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.125731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.125993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.134586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.134816 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.144512 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.144831 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.148904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.158367 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.158591 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.167333 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.167546 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.176478 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.176726 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.182900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.191475 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.191713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.198065 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.212209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.212677 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.221676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.222097 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.231169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.243981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.244328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.251190 kubelet[1999]: E0702 08:00:11.251120 1999 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:11.253070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.253328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.258175 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.266630 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.267004 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.275966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.276304 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.285127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.285394 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.294188 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.294470 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.303729 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.303979 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.312872 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.313105 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.322093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.322322 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.331473 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.331698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.340557 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.340782 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.351232 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.351450 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.361418 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.361689 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.371860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.372151 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.381017 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.381291 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.390074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.390343 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.399186 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.399443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.408325 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.408583 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.417151 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.417397 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.426415 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.426662 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.435531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.435785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.444766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.445009 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.454552 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.454803 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.468845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.469107 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.477830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.478089 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.486768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.486994 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.495717 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.495988 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.504777 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.505000 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.513610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.513839 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.522910 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.523149 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.531666 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.531888 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.541202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.541443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.550469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.550753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.554980 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.563804 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.564068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.574177 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.574452 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.588290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.588580 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.588749 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.601958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.602245 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.602387 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.610922 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.611169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.619871 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.630071 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.630320 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.630460 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.638973 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.639216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.647935 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.648193 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.657265 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.657515 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.666835 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.667090 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.680600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.680925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.689738 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.690066 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.698651 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.698917 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.707526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.713085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.713358 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.721958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.722210 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.731050 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.731329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.740033 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.740278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.749813 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.750122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.759362 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.759607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.768356 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.768587 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.783876 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.784308 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.793407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#31 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.793720 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.803074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#34 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.803398 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.812906 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.813203 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.822252 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#33 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Jul 2 08:00:11.822535 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001