Apr 12 18:46:02.096860 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:46:02.096918 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:46:02.096937 kernel: BIOS-provided physical RAM map: Apr 12 18:46:02.096952 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Apr 12 18:46:02.096965 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Apr 12 18:46:02.096978 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Apr 12 18:46:02.096999 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Apr 12 18:46:02.097013 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Apr 12 18:46:02.097040 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Apr 12 18:46:02.097053 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Apr 12 18:46:02.097067 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Apr 12 18:46:02.097081 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Apr 12 18:46:02.097094 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Apr 12 18:46:02.097109 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Apr 12 18:46:02.097130 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Apr 12 18:46:02.097146 kernel: NX (Execute Disable) protection: active Apr 12 18:46:02.097161 kernel: efi: EFI v2.70 by EDK II Apr 12 18:46:02.097176 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 Apr 12 18:46:02.097191 kernel: random: crng init done Apr 12 18:46:02.097205 kernel: SMBIOS 2.4 present. Apr 12 18:46:02.097220 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Apr 12 18:46:02.097235 kernel: Hypervisor detected: KVM Apr 12 18:46:02.097252 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:46:02.097267 kernel: kvm-clock: cpu 0, msr 16f191001, primary cpu clock Apr 12 18:46:02.097283 kernel: kvm-clock: using sched offset of 13180037818 cycles Apr 12 18:46:02.097299 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:46:02.097314 kernel: tsc: Detected 2299.998 MHz processor Apr 12 18:46:02.097329 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:46:02.097345 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:46:02.097361 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Apr 12 18:46:02.097376 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:46:02.097392 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Apr 12 18:46:02.097411 kernel: Using GB pages for direct mapping Apr 12 18:46:02.097427 kernel: Secure boot disabled Apr 12 18:46:02.097443 kernel: ACPI: Early table checksum verification disabled Apr 12 18:46:02.097458 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Apr 12 18:46:02.097474 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Apr 12 18:46:02.097489 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Apr 12 18:46:02.097505 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Apr 12 18:46:02.097521 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Apr 12 18:46:02.097546 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Apr 12 18:46:02.097573 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Apr 12 18:46:02.097589 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Apr 12 18:46:02.097605 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Apr 12 18:46:02.097621 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Apr 12 18:46:02.097638 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Apr 12 18:46:02.097659 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Apr 12 18:46:02.097675 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Apr 12 18:46:02.097692 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Apr 12 18:46:02.097709 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Apr 12 18:46:02.097726 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Apr 12 18:46:02.097742 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Apr 12 18:46:02.097759 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Apr 12 18:46:02.097775 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Apr 12 18:46:02.097792 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Apr 12 18:46:02.097812 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:46:02.097828 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:46:02.097845 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 18:46:02.097861 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Apr 12 18:46:02.097885 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Apr 12 18:46:02.097902 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Apr 12 18:46:02.097919 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Apr 12 18:46:02.097936 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Apr 12 18:46:02.097952 kernel: Zone ranges: Apr 12 18:46:02.097973 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:46:02.097990 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 18:46:02.098006 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:46:02.099060 kernel: Movable zone start for each node Apr 12 18:46:02.099085 kernel: Early memory node ranges Apr 12 18:46:02.099103 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Apr 12 18:46:02.099126 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Apr 12 18:46:02.099143 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Apr 12 18:46:02.099160 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Apr 12 18:46:02.099182 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:46:02.099198 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Apr 12 18:46:02.099215 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:46:02.099232 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Apr 12 18:46:02.099248 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Apr 12 18:46:02.099265 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Apr 12 18:46:02.099281 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Apr 12 18:46:02.099298 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:46:02.099315 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:46:02.099335 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:46:02.099351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:46:02.099368 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:46:02.099384 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:46:02.099400 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:46:02.099417 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:46:02.099433 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:46:02.099450 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Apr 12 18:46:02.099466 kernel: Booting paravirtualized kernel on KVM Apr 12 18:46:02.099486 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:46:02.099503 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:46:02.099520 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:46:02.099536 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:46:02.099552 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:46:02.099568 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:46:02.099585 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:46:02.099601 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Apr 12 18:46:02.099616 kernel: Policy zone: Normal Apr 12 18:46:02.099637 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:46:02.099653 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:46:02.099670 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Apr 12 18:46:02.099686 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:46:02.099703 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:46:02.099720 kernel: Memory: 7534432K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325892K reserved, 0K cma-reserved) Apr 12 18:46:02.099737 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:46:02.099753 kernel: Kernel/User page tables isolation: enabled Apr 12 18:46:02.099773 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:46:02.099791 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:46:02.099807 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:46:02.099825 kernel: rcu: RCU event tracing is enabled. Apr 12 18:46:02.099842 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:46:02.099859 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:46:02.099904 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:46:02.099922 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:46:02.099938 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:46:02.099959 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:46:02.099988 kernel: Console: colour dummy device 80x25 Apr 12 18:46:02.100006 kernel: printk: console [ttyS0] enabled Apr 12 18:46:02.100039 kernel: ACPI: Core revision 20210730 Apr 12 18:46:02.100064 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:46:02.100079 kernel: x2apic enabled Apr 12 18:46:02.100094 kernel: Switched APIC routing to physical x2apic. Apr 12 18:46:02.100110 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Apr 12 18:46:02.100126 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:46:02.100143 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Apr 12 18:46:02.100164 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Apr 12 18:46:02.100181 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Apr 12 18:46:02.100197 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:46:02.100213 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 18:46:02.100231 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 18:46:02.100248 kernel: Spectre V2 : Mitigation: IBRS Apr 12 18:46:02.100268 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:46:02.100283 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:46:02.100300 kernel: RETBleed: Mitigation: IBRS Apr 12 18:46:02.100316 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:46:02.100333 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Apr 12 18:46:02.100351 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:46:02.100367 kernel: MDS: Mitigation: Clear CPU buffers Apr 12 18:46:02.100384 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:46:02.100400 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:46:02.100421 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:46:02.100436 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:46:02.100451 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:46:02.100466 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:46:02.100482 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:46:02.100499 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:46:02.100515 kernel: LSM: Security Framework initializing Apr 12 18:46:02.100532 kernel: SELinux: Initializing. Apr 12 18:46:02.100549 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:46:02.100571 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:46:02.100587 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Apr 12 18:46:02.100604 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Apr 12 18:46:02.100619 kernel: signal: max sigframe size: 1776 Apr 12 18:46:02.100636 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:46:02.100652 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:46:02.100671 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:46:02.100724 kernel: x86: Booting SMP configuration: Apr 12 18:46:02.100739 kernel: .... node #0, CPUs: #1 Apr 12 18:46:02.107677 kernel: kvm-clock: cpu 1, msr 16f191041, secondary cpu clock Apr 12 18:46:02.107712 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:46:02.107733 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:46:02.107752 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:46:02.107770 kernel: smpboot: Max logical packages: 1 Apr 12 18:46:02.107788 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Apr 12 18:46:02.107806 kernel: devtmpfs: initialized Apr 12 18:46:02.107823 kernel: x86/mm: Memory block size: 128MB Apr 12 18:46:02.107840 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Apr 12 18:46:02.107864 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:46:02.107894 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:46:02.107912 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:46:02.107929 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:46:02.107947 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:46:02.107964 kernel: audit: type=2000 audit(1712947561.121:1): state=initialized audit_enabled=0 res=1 Apr 12 18:46:02.107982 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:46:02.107999 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:46:02.108018 kernel: cpuidle: using governor menu Apr 12 18:46:02.108057 kernel: ACPI: bus type PCI registered Apr 12 18:46:02.108075 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:46:02.108091 kernel: dca service started, version 1.12.1 Apr 12 18:46:02.108109 kernel: PCI: Using configuration type 1 for base access Apr 12 18:46:02.108127 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:46:02.108144 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:46:02.108162 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:46:02.108180 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:46:02.108198 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:46:02.108219 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:46:02.108236 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:46:02.108254 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:46:02.108271 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:46:02.108287 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:46:02.108304 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:46:02.108322 kernel: ACPI: Interpreter enabled Apr 12 18:46:02.108340 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:46:02.108357 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:46:02.108379 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:46:02.108397 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:46:02.108415 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:46:02.108651 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:46:02.108824 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:46:02.108848 kernel: PCI host bridge to bus 0000:00 Apr 12 18:46:02.109033 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:46:02.109199 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:46:02.109348 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:46:02.109495 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Apr 12 18:46:02.109642 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:46:02.109822 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:46:02.110018 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Apr 12 18:46:02.110226 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:46:02.110393 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:46:02.110569 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Apr 12 18:46:02.110737 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Apr 12 18:46:02.110911 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Apr 12 18:46:02.111106 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:46:02.111275 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Apr 12 18:46:02.111458 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Apr 12 18:46:02.111630 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:46:02.111798 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:46:02.111973 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Apr 12 18:46:02.111996 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:46:02.112015 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:46:02.112646 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:46:02.112671 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:46:02.112688 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:46:02.112705 kernel: iommu: Default domain type: Translated Apr 12 18:46:02.112737 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:46:02.112756 kernel: vgaarb: loaded Apr 12 18:46:02.112774 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:46:02.112792 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:46:02.112810 kernel: PTP clock support registered Apr 12 18:46:02.112828 kernel: Registered efivars operations Apr 12 18:46:02.112849 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:46:02.112866 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:46:02.112894 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Apr 12 18:46:02.112911 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Apr 12 18:46:02.112928 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Apr 12 18:46:02.112954 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Apr 12 18:46:02.112974 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:46:02.112991 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:46:02.113009 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:46:02.113042 kernel: pnp: PnP ACPI init Apr 12 18:46:02.113059 kernel: pnp: PnP ACPI: found 7 devices Apr 12 18:46:02.113077 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:46:02.113094 kernel: NET: Registered PF_INET protocol family Apr 12 18:46:02.113111 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:46:02.113128 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Apr 12 18:46:02.113144 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:46:02.113188 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:46:02.113209 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 18:46:02.113232 kernel: TCP: Hash tables configured (established 65536 bind 65536) Apr 12 18:46:02.113250 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:46:02.113267 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:46:02.113283 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:46:02.113301 kernel: NET: Registered PF_XDP protocol family Apr 12 18:46:02.113485 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:46:02.113636 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:46:02.113801 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:46:02.113966 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Apr 12 18:46:02.114205 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:46:02.114229 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:46:02.114246 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 18:46:02.114264 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Apr 12 18:46:02.114281 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:46:02.114298 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:46:02.114315 kernel: clocksource: Switched to clocksource tsc Apr 12 18:46:02.114337 kernel: Initialise system trusted keyrings Apr 12 18:46:02.114354 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Apr 12 18:46:02.114371 kernel: Key type asymmetric registered Apr 12 18:46:02.114387 kernel: Asymmetric key parser 'x509' registered Apr 12 18:46:02.114404 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:46:02.114421 kernel: io scheduler mq-deadline registered Apr 12 18:46:02.114438 kernel: io scheduler kyber registered Apr 12 18:46:02.114455 kernel: io scheduler bfq registered Apr 12 18:46:02.114471 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:46:02.114493 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:46:02.114654 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Apr 12 18:46:02.114675 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:46:02.114831 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Apr 12 18:46:02.114853 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:46:02.115015 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Apr 12 18:46:02.115049 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:46:02.115066 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:46:02.115083 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 18:46:02.115104 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Apr 12 18:46:02.115121 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Apr 12 18:46:02.115284 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Apr 12 18:46:02.115307 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:46:02.115324 kernel: i8042: Warning: Keylock active Apr 12 18:46:02.115341 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:46:02.115358 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:46:02.115521 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:46:02.115671 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:46:02.115815 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:46:01 UTC (1712947561) Apr 12 18:46:02.115966 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:46:02.115986 kernel: intel_pstate: CPU model not supported Apr 12 18:46:02.116003 kernel: pstore: Registered efi as persistent store backend Apr 12 18:46:02.120932 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:46:02.120965 kernel: Segment Routing with IPv6 Apr 12 18:46:02.120982 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:46:02.121007 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:46:02.121044 kernel: Key type dns_resolver registered Apr 12 18:46:02.121061 kernel: IPI shorthand broadcast: enabled Apr 12 18:46:02.121078 kernel: sched_clock: Marking stable (717162645, 133547006)->(894256657, -43547006) Apr 12 18:46:02.121095 kernel: registered taskstats version 1 Apr 12 18:46:02.121112 kernel: Loading compiled-in X.509 certificates Apr 12 18:46:02.121129 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:46:02.121146 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:46:02.121163 kernel: Key type .fscrypt registered Apr 12 18:46:02.121198 kernel: Key type fscrypt-provisioning registered Apr 12 18:46:02.121217 kernel: pstore: Using crash dump compression: deflate Apr 12 18:46:02.121235 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:46:02.121254 kernel: ima: No architecture policies found Apr 12 18:46:02.121271 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:46:02.121289 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:46:02.121305 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:46:02.121323 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:46:02.121344 kernel: Run /init as init process Apr 12 18:46:02.121360 kernel: with arguments: Apr 12 18:46:02.121377 kernel: /init Apr 12 18:46:02.121405 kernel: with environment: Apr 12 18:46:02.121424 kernel: HOME=/ Apr 12 18:46:02.121442 kernel: TERM=linux Apr 12 18:46:02.121460 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:46:02.121481 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:46:02.121506 systemd[1]: Detected virtualization kvm. Apr 12 18:46:02.121525 systemd[1]: Detected architecture x86-64. Apr 12 18:46:02.121542 systemd[1]: Running in initrd. Apr 12 18:46:02.121560 systemd[1]: No hostname configured, using default hostname. Apr 12 18:46:02.121576 systemd[1]: Hostname set to . Apr 12 18:46:02.121614 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:46:02.121639 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:46:02.121658 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:46:02.121681 systemd[1]: Reached target cryptsetup.target. Apr 12 18:46:02.121699 systemd[1]: Reached target paths.target. Apr 12 18:46:02.121718 systemd[1]: Reached target slices.target. Apr 12 18:46:02.121736 systemd[1]: Reached target swap.target. Apr 12 18:46:02.121755 systemd[1]: Reached target timers.target. Apr 12 18:46:02.121774 systemd[1]: Listening on iscsid.socket. Apr 12 18:46:02.121793 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:46:02.121815 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:46:02.121834 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:46:02.121851 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:46:02.121869 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:46:02.121934 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:46:02.121953 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:46:02.121972 systemd[1]: Reached target sockets.target. Apr 12 18:46:02.121990 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:46:02.122009 systemd[1]: Finished network-cleanup.service. Apr 12 18:46:02.122064 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:46:02.122083 systemd[1]: Starting systemd-journald.service... Apr 12 18:46:02.122102 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:46:02.122138 systemd[1]: Starting systemd-resolved.service... Apr 12 18:46:02.122161 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:46:02.122181 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:46:02.122200 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:46:02.122223 kernel: audit: type=1130 audit(1712947562.115:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.122249 systemd-journald[189]: Journal started Apr 12 18:46:02.122344 systemd-journald[189]: Runtime Journal (/run/log/journal/9c42b30454fc32d53fb078c4f24afe3c) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:46:02.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.136394 systemd[1]: Started systemd-journald.service. Apr 12 18:46:02.136477 kernel: audit: type=1130 audit(1712947562.125:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.136504 kernel: audit: type=1130 audit(1712947562.131:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.123585 systemd-modules-load[190]: Inserted module 'overlay' Apr 12 18:46:02.144164 kernel: audit: type=1130 audit(1712947562.137:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.132753 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:46:02.143878 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:46:02.150423 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:46:02.180574 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:46:02.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.185045 kernel: audit: type=1130 audit(1712947562.179:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.192809 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:46:02.203370 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:46:02.203407 kernel: audit: type=1130 audit(1712947562.196:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.203798 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:46:02.206257 systemd-resolved[191]: Positive Trust Anchors: Apr 12 18:46:02.206269 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:46:02.206335 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:46:02.220718 kernel: Bridge firewalling registered Apr 12 18:46:02.214048 systemd-modules-load[190]: Inserted module 'br_netfilter' Apr 12 18:46:02.219817 systemd-resolved[191]: Defaulting to hostname 'linux'. Apr 12 18:46:02.228119 dracut-cmdline[205]: dracut-dracut-053 Apr 12 18:46:02.250749 kernel: audit: type=1130 audit(1712947562.235:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.250867 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:46:02.232410 systemd[1]: Started systemd-resolved.service. Apr 12 18:46:02.261159 kernel: SCSI subsystem initialized Apr 12 18:46:02.236256 systemd[1]: Reached target nss-lookup.target. Apr 12 18:46:02.279596 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:46:02.279668 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:46:02.281302 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:46:02.286161 systemd-modules-load[190]: Inserted module 'dm_multipath' Apr 12 18:46:02.287842 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:46:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.300378 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:46:02.314422 kernel: audit: type=1130 audit(1712947562.298:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.313604 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:46:02.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.327065 kernel: audit: type=1130 audit(1712947562.318:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.333056 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:46:02.353075 kernel: iscsi: registered transport (tcp) Apr 12 18:46:02.380053 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:46:02.380148 kernel: QLogic iSCSI HBA Driver Apr 12 18:46:02.424311 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:46:02.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.429942 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:46:02.487113 kernel: raid6: avx2x4 gen() 17846 MB/s Apr 12 18:46:02.504073 kernel: raid6: avx2x4 xor() 7927 MB/s Apr 12 18:46:02.521065 kernel: raid6: avx2x2 gen() 18246 MB/s Apr 12 18:46:02.538066 kernel: raid6: avx2x2 xor() 18685 MB/s Apr 12 18:46:02.555092 kernel: raid6: avx2x1 gen() 14135 MB/s Apr 12 18:46:02.572074 kernel: raid6: avx2x1 xor() 16092 MB/s Apr 12 18:46:02.589052 kernel: raid6: sse2x4 gen() 11063 MB/s Apr 12 18:46:02.607068 kernel: raid6: sse2x4 xor() 6610 MB/s Apr 12 18:46:02.624050 kernel: raid6: sse2x2 gen() 12024 MB/s Apr 12 18:46:02.641055 kernel: raid6: sse2x2 xor() 7447 MB/s Apr 12 18:46:02.658052 kernel: raid6: sse2x1 gen() 10583 MB/s Apr 12 18:46:02.675498 kernel: raid6: sse2x1 xor() 5206 MB/s Apr 12 18:46:02.675529 kernel: raid6: using algorithm avx2x2 gen() 18246 MB/s Apr 12 18:46:02.675559 kernel: raid6: .... xor() 18685 MB/s, rmw enabled Apr 12 18:46:02.676244 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:46:02.692067 kernel: xor: automatically using best checksumming function avx Apr 12 18:46:02.798070 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:46:02.809534 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:46:02.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.809000 audit: BPF prog-id=7 op=LOAD Apr 12 18:46:02.809000 audit: BPF prog-id=8 op=LOAD Apr 12 18:46:02.811168 systemd[1]: Starting systemd-udevd.service... Apr 12 18:46:02.828401 systemd-udevd[387]: Using default interface naming scheme 'v252'. Apr 12 18:46:02.835875 systemd[1]: Started systemd-udevd.service. Apr 12 18:46:02.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.838278 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:46:02.861825 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Apr 12 18:46:02.901503 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:46:02.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:02.907009 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:46:02.974298 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:46:02.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:03.051048 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:46:03.075045 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:46:03.083062 kernel: AES CTR mode by8 optimization enabled Apr 12 18:46:03.110066 kernel: scsi host0: Virtio SCSI HBA Apr 12 18:46:03.151049 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Apr 12 18:46:03.235111 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Apr 12 18:46:03.235523 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Apr 12 18:46:03.235729 kernel: sd 0:0:1:0: [sda] Write Protect is off Apr 12 18:46:03.240139 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Apr 12 18:46:03.240461 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 18:46:03.266068 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:46:03.266160 kernel: GPT:17805311 != 25165823 Apr 12 18:46:03.266184 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:46:03.272178 kernel: GPT:17805311 != 25165823 Apr 12 18:46:03.275874 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:46:03.281209 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:46:03.293287 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Apr 12 18:46:03.338516 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:46:03.366312 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (434) Apr 12 18:46:03.354053 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:46:03.376159 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:46:03.410098 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:46:03.415250 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:46:03.436354 systemd[1]: Starting disk-uuid.service... Apr 12 18:46:03.465063 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:46:03.465520 disk-uuid[513]: Primary Header is updated. Apr 12 18:46:03.465520 disk-uuid[513]: Secondary Entries is updated. Apr 12 18:46:03.465520 disk-uuid[513]: Secondary Header is updated. Apr 12 18:46:04.501286 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:46:04.501656 disk-uuid[514]: The operation has completed successfully. Apr 12 18:46:04.562821 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:46:04.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.562962 systemd[1]: Finished disk-uuid.service. Apr 12 18:46:04.585517 systemd[1]: Starting verity-setup.service... Apr 12 18:46:04.613073 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:46:04.684743 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:46:04.687378 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:46:04.706477 systemd[1]: Finished verity-setup.service. Apr 12 18:46:04.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.789084 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:46:04.789154 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:46:04.797420 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:46:04.844222 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:46:04.844265 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:46:04.844290 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:46:04.798465 systemd[1]: Starting ignition-setup.service... Apr 12 18:46:04.857180 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:46:04.813216 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:46:04.889189 systemd[1]: Finished ignition-setup.service. Apr 12 18:46:04.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.890971 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:46:04.930393 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:46:04.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.930000 audit: BPF prog-id=9 op=LOAD Apr 12 18:46:04.932594 systemd[1]: Starting systemd-networkd.service... Apr 12 18:46:04.966502 systemd-networkd[688]: lo: Link UP Apr 12 18:46:04.966516 systemd-networkd[688]: lo: Gained carrier Apr 12 18:46:04.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:04.967431 systemd-networkd[688]: Enumeration completed Apr 12 18:46:04.967560 systemd[1]: Started systemd-networkd.service. Apr 12 18:46:04.967918 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:46:04.970218 systemd-networkd[688]: eth0: Link UP Apr 12 18:46:04.970226 systemd-networkd[688]: eth0: Gained carrier Apr 12 18:46:04.974478 systemd[1]: Reached target network.target. Apr 12 18:46:04.980149 systemd-networkd[688]: eth0: DHCPv4 address 10.128.0.4/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:46:04.997340 systemd[1]: Starting iscsiuio.service... Apr 12 18:46:05.069283 systemd[1]: Started iscsiuio.service. Apr 12 18:46:05.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.078187 systemd[1]: Starting iscsid.service... Apr 12 18:46:05.090158 iscsid[697]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:46:05.090158 iscsid[697]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:46:05.090158 iscsid[697]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:46:05.090158 iscsid[697]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:46:05.090158 iscsid[697]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:46:05.090158 iscsid[697]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:46:05.090158 iscsid[697]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:46:05.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.097295 systemd[1]: Started iscsid.service. Apr 12 18:46:05.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.168467 ignition[652]: Ignition 2.14.0 Apr 12 18:46:05.110100 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:46:05.168482 ignition[652]: Stage: fetch-offline Apr 12 18:46:05.161609 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:46:05.168561 ignition[652]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:05.206514 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:46:05.168602 ignition[652]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:05.225543 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:46:05.185774 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:05.240236 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:46:05.185973 ignition[652]: parsed url from cmdline: "" Apr 12 18:46:05.254281 systemd[1]: Reached target remote-fs.target. Apr 12 18:46:05.185980 ignition[652]: no config URL provided Apr 12 18:46:05.263379 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:46:05.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.185987 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:46:05.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.283314 systemd[1]: Starting ignition-fetch.service... Apr 12 18:46:05.185998 ignition[652]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:46:05.332255 unknown[712]: fetched base config from "system" Apr 12 18:46:05.186008 ignition[652]: failed to fetch config: resource requires networking Apr 12 18:46:05.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.332264 unknown[712]: fetched base config from "system" Apr 12 18:46:05.186194 ignition[652]: Ignition finished successfully Apr 12 18:46:05.332270 unknown[712]: fetched user config from "gcp" Apr 12 18:46:05.294166 ignition[712]: Ignition 2.14.0 Apr 12 18:46:05.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.350694 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:46:05.294177 ignition[712]: Stage: fetch Apr 12 18:46:05.365449 systemd[1]: Finished ignition-fetch.service. Apr 12 18:46:05.294350 ignition[712]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:05.382384 systemd[1]: Starting ignition-kargs.service... Apr 12 18:46:05.294384 ignition[712]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:05.406590 systemd[1]: Finished ignition-kargs.service. Apr 12 18:46:05.301965 ignition[712]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:05.427494 systemd[1]: Starting ignition-disks.service... Apr 12 18:46:05.302208 ignition[712]: parsed url from cmdline: "" Apr 12 18:46:05.458457 systemd[1]: Finished ignition-disks.service. Apr 12 18:46:05.302214 ignition[712]: no config URL provided Apr 12 18:46:05.473417 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:46:05.302221 ignition[712]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:46:05.489269 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:46:05.302233 ignition[712]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:46:05.505253 systemd[1]: Reached target local-fs.target. Apr 12 18:46:05.302275 ignition[712]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Apr 12 18:46:05.511283 systemd[1]: Reached target sysinit.target. Apr 12 18:46:05.313488 ignition[712]: GET result: OK Apr 12 18:46:05.538245 systemd[1]: Reached target basic.target. Apr 12 18:46:05.313618 ignition[712]: parsing config with SHA512: ea6fbc6d3d40aaebf4611e7d33a86348e39434b5ac9c35a63be5320b8e11f728843a8b15fc38795daec35e3a7c5aa70b7349c9a13747a59749f9cf6888ead232 Apr 12 18:46:05.553471 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:46:05.335238 ignition[712]: fetch: fetch complete Apr 12 18:46:05.335246 ignition[712]: fetch: fetch passed Apr 12 18:46:05.335305 ignition[712]: Ignition finished successfully Apr 12 18:46:05.395279 ignition[718]: Ignition 2.14.0 Apr 12 18:46:05.395287 ignition[718]: Stage: kargs Apr 12 18:46:05.395406 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:05.395433 ignition[718]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:05.402729 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:05.403944 ignition[718]: kargs: kargs passed Apr 12 18:46:05.404042 ignition[718]: Ignition finished successfully Apr 12 18:46:05.438194 ignition[724]: Ignition 2.14.0 Apr 12 18:46:05.438205 ignition[724]: Stage: disks Apr 12 18:46:05.438338 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:05.438368 ignition[724]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:05.447499 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:05.449120 ignition[724]: disks: disks passed Apr 12 18:46:05.449180 ignition[724]: Ignition finished successfully Apr 12 18:46:05.578149 systemd-fsck[732]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:46:05.740944 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:46:05.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:05.751332 systemd[1]: Mounting sysroot.mount... Apr 12 18:46:05.782210 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:46:05.777983 systemd[1]: Mounted sysroot.mount. Apr 12 18:46:05.789451 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:46:05.807548 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:46:05.820766 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:46:05.820821 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:46:05.820852 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:46:05.924198 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (738) Apr 12 18:46:05.924248 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:46:05.924273 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:46:05.924295 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:46:05.924319 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:46:05.836485 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:46:05.858885 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:46:05.892393 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:46:05.957194 initrd-setup-root[748]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:46:05.927723 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:46:05.976176 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:46:05.986132 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:46:05.997165 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:46:06.014396 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:46:06.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:06.015650 systemd[1]: Starting ignition-mount.service... Apr 12 18:46:06.044182 systemd[1]: Starting sysroot-boot.service... Apr 12 18:46:06.052261 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:46:06.052378 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:46:06.079277 ignition[803]: INFO : Ignition 2.14.0 Apr 12 18:46:06.079277 ignition[803]: INFO : Stage: mount Apr 12 18:46:06.079277 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:06.079277 ignition[803]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:06.156221 kernel: kauditd_printk_skb: 24 callbacks suppressed Apr 12 18:46:06.156268 kernel: audit: type=1130 audit(1712947566.110:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:06.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:06.088533 systemd[1]: Finished sysroot-boot.service. Apr 12 18:46:06.191262 kernel: audit: type=1130 audit(1712947566.163:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:06.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:06.191379 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:06.191379 ignition[803]: INFO : mount: mount passed Apr 12 18:46:06.191379 ignition[803]: INFO : Ignition finished successfully Apr 12 18:46:06.264202 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (813) Apr 12 18:46:06.264237 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:46:06.264254 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:46:06.264275 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:46:06.264295 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:46:06.111771 systemd[1]: Finished ignition-mount.service. Apr 12 18:46:06.165859 systemd[1]: Starting ignition-files.service... Apr 12 18:46:06.202393 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:46:06.268185 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:46:06.305178 ignition[832]: INFO : Ignition 2.14.0 Apr 12 18:46:06.305178 ignition[832]: INFO : Stage: files Apr 12 18:46:06.305178 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:06.305178 ignition[832]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:06.305178 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:06.305178 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:46:06.380193 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (835) Apr 12 18:46:06.322099 unknown[832]: wrote ssh authorized keys file for user: core Apr 12 18:46:06.389182 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:46:06.389182 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:46:06.389182 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:46:06.389182 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:46:06.389182 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2117905199" Apr 12 18:46:06.389182 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2117905199": device or resource busy Apr 12 18:46:06.389182 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2117905199", trying btrfs: device or resource busy Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2117905199" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2117905199" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2117905199" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2117905199" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:46:06.389182 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:46:06.667731 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:46:06.888155 systemd-networkd[688]: eth0: Gained IPv6LL Apr 12 18:46:06.929913 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:46:06.954203 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:46:06.954203 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:46:06.954203 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:46:07.087643 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:46:07.197985 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3196671908" Apr 12 18:46:07.222183 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3196671908": device or resource busy Apr 12 18:46:07.222183 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3196671908", trying btrfs: device or resource busy Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3196671908" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3196671908" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem3196671908" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem3196671908" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:46:07.222183 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:46:07.212591 systemd[1]: mnt-oem3196671908.mount: Deactivated successfully. Apr 12 18:46:07.448213 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Apr 12 18:46:07.603641 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 18:46:07.627186 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:46:07.627186 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:46:07.627186 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:46:07.627186 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Apr 12 18:46:08.150698 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4157815963" Apr 12 18:46:08.175191 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4157815963": device or resource busy Apr 12 18:46:08.175191 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4157815963", trying btrfs: device or resource busy Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4157815963" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4157815963" Apr 12 18:46:08.175191 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4157815963" Apr 12 18:46:08.605301 kernel: audit: type=1130 audit(1712947568.212:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.605335 kernel: audit: type=1130 audit(1712947568.301:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.605364 kernel: audit: type=1130 audit(1712947568.359:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.605379 kernel: audit: type=1131 audit(1712947568.359:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.605393 kernel: audit: type=1130 audit(1712947568.474:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.605407 kernel: audit: type=1131 audit(1712947568.474:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.169627 systemd[1]: mnt-oem4157815963.mount: Deactivated successfully. Apr 12 18:46:08.655213 kernel: audit: type=1130 audit(1712947568.625:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4157815963" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3985792857" Apr 12 18:46:08.655359 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3985792857": device or resource busy Apr 12 18:46:08.655359 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3985792857", trying btrfs: device or resource busy Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3985792857" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3985792857" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem3985792857" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem3985792857" Apr 12 18:46:08.655359 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: op(1a): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: op(1a): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: op(1b): [started] processing unit "oem-gce.service" Apr 12 18:46:08.655359 ignition[832]: INFO : files: op(1b): [finished] processing unit "oem-gce.service" Apr 12 18:46:08.986197 kernel: audit: type=1131 audit(1712947568.806:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.197154 systemd[1]: Finished ignition-files.service. Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1c): [started] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1c): [finished] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1d): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1d): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1f): [started] processing unit "prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1f): op(20): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1f): op(20): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(1f): [finished] processing unit "prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(22): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(23): [started] setting preset to enabled for "oem-gce.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(23): [finished] setting preset to enabled for "oem-gce.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(24): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(24): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(25): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:46:09.001368 ignition[832]: INFO : files: op(25): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:46:09.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.223590 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:46:09.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.383307 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:46:09.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.405462 ignition[832]: INFO : files: createResultFile: createFiles: op(26): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:46:09.405462 ignition[832]: INFO : files: createResultFile: createFiles: op(26): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:46:09.405462 ignition[832]: INFO : files: files passed Apr 12 18:46:09.405462 ignition[832]: INFO : Ignition finished successfully Apr 12 18:46:09.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.248443 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:46:09.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.249675 systemd[1]: Starting ignition-quench.service... Apr 12 18:46:09.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.277541 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:46:09.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.302719 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:46:08.302862 systemd[1]: Finished ignition-quench.service. Apr 12 18:46:09.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.360449 systemd[1]: Reached target ignition-complete.target. Apr 12 18:46:08.426312 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:46:09.590282 ignition[870]: INFO : Ignition 2.14.0 Apr 12 18:46:09.590282 ignition[870]: INFO : Stage: umount Apr 12 18:46:09.590282 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:46:09.590282 ignition[870]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:46:09.590282 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:46:09.590282 ignition[870]: INFO : umount: umount passed Apr 12 18:46:09.590282 ignition[870]: INFO : Ignition finished successfully Apr 12 18:46:08.463646 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:46:09.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.463758 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:46:09.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.475335 systemd[1]: Reached target initrd-fs.target. Apr 12 18:46:08.535378 systemd[1]: Reached target initrd.target. Apr 12 18:46:08.561414 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:46:09.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.562733 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:46:09.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.583602 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:46:09.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.783000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:46:08.627804 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:46:08.671003 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:46:08.699559 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:46:09.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.739522 systemd[1]: Stopped target timers.target. Apr 12 18:46:09.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.756509 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:46:09.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.756695 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:46:08.807697 systemd[1]: Stopped target initrd.target. Apr 12 18:46:09.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.844568 systemd[1]: Stopped target basic.target. Apr 12 18:46:08.885471 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:46:08.900490 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:46:09.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.944513 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:46:09.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:08.975497 systemd[1]: Stopped target remote-fs.target. Apr 12 18:46:08.994459 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:46:09.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.009469 systemd[1]: Stopped target sysinit.target. Apr 12 18:46:09.021536 systemd[1]: Stopped target local-fs.target. Apr 12 18:46:09.039566 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:46:10.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.081568 systemd[1]: Stopped target swap.target. Apr 12 18:46:10.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.116473 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:46:10.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:10.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:09.116670 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:46:09.127706 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:46:09.175530 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:46:09.175861 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:46:09.187730 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:46:09.187922 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:46:09.207683 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:46:10.129191 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Apr 12 18:46:10.129254 iscsid[697]: iscsid shutting down. Apr 12 18:46:09.207871 systemd[1]: Stopped ignition-files.service. Apr 12 18:46:09.230229 systemd[1]: Stopping ignition-mount.service... Apr 12 18:46:09.270556 systemd[1]: Stopping iscsiuio.service... Apr 12 18:46:09.301193 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:46:09.301557 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:46:09.336114 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:46:09.347464 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:46:09.347788 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:46:09.373606 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:46:09.373904 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:46:09.395904 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:46:09.396779 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:46:09.397003 systemd[1]: Stopped iscsiuio.service. Apr 12 18:46:09.413123 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:46:09.413235 systemd[1]: Stopped ignition-mount.service. Apr 12 18:46:09.435870 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:46:09.435985 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:46:09.464009 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:46:09.464181 systemd[1]: Stopped ignition-disks.service. Apr 12 18:46:09.479410 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:46:09.479483 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:46:09.504522 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:46:09.504601 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:46:09.520416 systemd[1]: Stopped target network.target. Apr 12 18:46:09.536307 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:46:09.536415 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:46:09.552432 systemd[1]: Stopped target paths.target. Apr 12 18:46:09.566184 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:46:09.570155 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:46:09.582313 systemd[1]: Stopped target slices.target. Apr 12 18:46:09.597277 systemd[1]: Stopped target sockets.target. Apr 12 18:46:09.604448 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:46:09.604489 systemd[1]: Closed iscsid.socket. Apr 12 18:46:09.617528 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:46:09.617593 systemd[1]: Closed iscsiuio.socket. Apr 12 18:46:09.668394 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:46:09.668475 systemd[1]: Stopped ignition-setup.service. Apr 12 18:46:09.689470 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:46:09.689544 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:46:09.705566 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:46:09.710117 systemd-networkd[688]: eth0: DHCPv6 lease lost Apr 12 18:46:09.720497 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:46:09.728142 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:46:09.728265 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:46:09.747991 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:46:09.748150 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:46:09.767009 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:46:09.767150 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:46:09.784488 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:46:09.784533 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:46:09.799385 systemd[1]: Stopping network-cleanup.service... Apr 12 18:46:09.812176 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:46:09.812299 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:46:09.827289 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:46:09.827365 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:46:09.843462 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:46:09.843530 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:46:09.858433 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:46:09.875777 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:46:09.876455 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:46:09.876609 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:46:09.890798 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:46:09.890891 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:46:09.904332 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:46:09.904385 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:46:09.919322 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:46:09.919397 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:46:09.935403 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:46:09.935472 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:46:09.951352 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:46:09.951421 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:46:09.974480 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:46:09.996150 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:46:09.996271 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:46:10.011741 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:46:10.011884 systemd[1]: Stopped network-cleanup.service. Apr 12 18:46:10.026526 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:46:10.026637 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:46:10.041440 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:46:10.059337 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:46:10.089171 systemd[1]: Switching root. Apr 12 18:46:10.132821 systemd-journald[189]: Journal stopped Apr 12 18:46:14.807496 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:46:14.807604 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:46:14.807641 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:46:14.807665 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:46:14.807694 kernel: SELinux: policy capability open_perms=1 Apr 12 18:46:14.807722 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:46:14.807745 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:46:14.807773 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:46:14.807795 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:46:14.807817 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:46:14.807839 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:46:14.807863 systemd[1]: Successfully loaded SELinux policy in 111.460ms. Apr 12 18:46:14.807915 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.577ms. Apr 12 18:46:14.807944 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:46:14.807968 systemd[1]: Detected virtualization kvm. Apr 12 18:46:14.807991 systemd[1]: Detected architecture x86-64. Apr 12 18:46:14.808015 systemd[1]: Detected first boot. Apr 12 18:46:14.808050 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:46:14.808074 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:46:14.808099 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:46:14.808124 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:46:14.808153 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:46:14.808178 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:46:14.808208 kernel: kauditd_printk_skb: 49 callbacks suppressed Apr 12 18:46:14.808230 kernel: audit: type=1334 audit(1712947573.915:87): prog-id=12 op=LOAD Apr 12 18:46:14.808258 kernel: audit: type=1334 audit(1712947573.915:88): prog-id=3 op=UNLOAD Apr 12 18:46:14.808281 kernel: audit: type=1334 audit(1712947573.927:89): prog-id=13 op=LOAD Apr 12 18:46:14.808303 kernel: audit: type=1334 audit(1712947573.941:90): prog-id=14 op=LOAD Apr 12 18:46:14.808328 kernel: audit: type=1334 audit(1712947573.941:91): prog-id=4 op=UNLOAD Apr 12 18:46:14.808349 kernel: audit: type=1334 audit(1712947573.941:92): prog-id=5 op=UNLOAD Apr 12 18:46:14.808371 kernel: audit: type=1334 audit(1712947573.948:93): prog-id=15 op=LOAD Apr 12 18:46:14.808392 kernel: audit: type=1334 audit(1712947573.948:94): prog-id=12 op=UNLOAD Apr 12 18:46:14.808414 kernel: audit: type=1334 audit(1712947573.955:95): prog-id=16 op=LOAD Apr 12 18:46:14.808435 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:46:14.808459 kernel: audit: type=1334 audit(1712947573.963:96): prog-id=17 op=LOAD Apr 12 18:46:14.808481 systemd[1]: Stopped iscsid.service. Apr 12 18:46:14.808504 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:46:14.808531 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:46:14.808555 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:46:14.808586 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:46:14.808617 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:46:14.808647 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:46:14.808670 systemd[1]: Created slice system-getty.slice. Apr 12 18:46:14.808693 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:46:14.808718 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:46:14.808745 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:46:14.808770 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:46:14.808797 systemd[1]: Created slice user.slice. Apr 12 18:46:14.808821 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:46:14.808844 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:46:14.808868 systemd[1]: Set up automount boot.automount. Apr 12 18:46:14.808891 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:46:14.808915 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:46:14.808938 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:46:14.808965 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:46:14.808989 systemd[1]: Reached target integritysetup.target. Apr 12 18:46:14.809012 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:46:14.809052 systemd[1]: Reached target remote-fs.target. Apr 12 18:46:14.809077 systemd[1]: Reached target slices.target. Apr 12 18:46:14.809100 systemd[1]: Reached target swap.target. Apr 12 18:46:14.809123 systemd[1]: Reached target torcx.target. Apr 12 18:46:14.809147 systemd[1]: Reached target veritysetup.target. Apr 12 18:46:14.809170 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:46:14.809197 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:46:14.809221 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:46:14.809244 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:46:14.809268 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:46:14.809293 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:46:14.809316 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:46:14.809339 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:46:14.809362 systemd[1]: Mounting media.mount... Apr 12 18:46:14.809386 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:46:14.809414 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:46:14.809437 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:46:14.809460 systemd[1]: Mounting tmp.mount... Apr 12 18:46:14.809485 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:46:14.809509 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:46:14.809531 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:46:14.809554 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:46:14.809577 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:46:14.809600 systemd[1]: Starting modprobe@drm.service... Apr 12 18:46:14.809627 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:46:14.809657 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:46:14.809680 systemd[1]: Starting modprobe@loop.service... Apr 12 18:46:14.809702 kernel: fuse: init (API version 7.34) Apr 12 18:46:14.809725 kernel: loop: module loaded Apr 12 18:46:14.809747 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:46:14.809771 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:46:14.809796 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:46:14.809820 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:46:14.809847 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:46:14.809870 systemd[1]: Stopped systemd-journald.service. Apr 12 18:46:14.809893 systemd[1]: Starting systemd-journald.service... Apr 12 18:46:14.809916 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:46:14.809939 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:46:14.809969 systemd-journald[993]: Journal started Apr 12 18:46:14.810068 systemd-journald[993]: Runtime Journal (/run/log/journal/9c42b30454fc32d53fb078c4f24afe3c) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:46:10.132000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:46:10.458000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:46:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:46:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:46:10.608000 audit: BPF prog-id=10 op=LOAD Apr 12 18:46:10.608000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:46:10.608000 audit: BPF prog-id=11 op=LOAD Apr 12 18:46:10.608000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:46:10.778000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:46:10.778000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.778000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:46:10.788000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:46:10.788000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.788000 audit: CWD cwd="/" Apr 12 18:46:10.788000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:10.788000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:10.788000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:46:13.915000 audit: BPF prog-id=12 op=LOAD Apr 12 18:46:13.915000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:46:13.927000 audit: BPF prog-id=13 op=LOAD Apr 12 18:46:13.941000 audit: BPF prog-id=14 op=LOAD Apr 12 18:46:13.941000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:46:13.941000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:46:13.948000 audit: BPF prog-id=15 op=LOAD Apr 12 18:46:13.948000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:46:13.955000 audit: BPF prog-id=16 op=LOAD Apr 12 18:46:13.963000 audit: BPF prog-id=17 op=LOAD Apr 12 18:46:13.963000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:46:13.963000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:46:13.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:13.998000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:46:14.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.769000 audit: BPF prog-id=18 op=LOAD Apr 12 18:46:14.769000 audit: BPF prog-id=19 op=LOAD Apr 12 18:46:14.769000 audit: BPF prog-id=20 op=LOAD Apr 12 18:46:14.769000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:46:14.769000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:46:14.803000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:46:14.803000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff81da6c70 a2=4000 a3=7fff81da6d0c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:14.803000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:46:10.772857 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:46:13.913809 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:46:10.774159 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:46:13.966131 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:46:10.774197 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:46:10.774252 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:46:10.774271 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:46:10.774331 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:46:10.774355 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:46:10.774692 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:46:10.774772 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:46:10.774798 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:46:10.777848 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:46:10.777928 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:46:10.777966 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:46:10.777996 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:46:10.778042 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:46:10.778071 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:46:13.290220 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:46:13.290528 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:46:13.290678 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:46:13.290930 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:46:13.290990 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:46:13.291078 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-04-12T18:46:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:46:14.828078 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:46:14.843102 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:46:14.857049 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:46:14.863334 systemd[1]: Stopped verity-setup.service. Apr 12 18:46:14.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.882046 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:46:14.891051 systemd[1]: Started systemd-journald.service. Apr 12 18:46:14.900498 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:46:14.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.907371 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:46:14.915392 systemd[1]: Mounted media.mount. Apr 12 18:46:14.922401 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:46:14.931365 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:46:14.940377 systemd[1]: Mounted tmp.mount. Apr 12 18:46:14.947533 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:46:14.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.956592 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:46:14.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.965600 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:46:14.965822 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:46:14.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.975599 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:46:14.975841 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:46:14.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.984554 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:46:14.984793 systemd[1]: Finished modprobe@drm.service. Apr 12 18:46:14.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:14.993537 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:46:14.993771 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:46:15.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.002605 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:46:15.002833 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:46:15.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.011589 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:46:15.011811 systemd[1]: Finished modprobe@loop.service. Apr 12 18:46:15.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.020678 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:46:15.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.029661 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:46:15.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.038689 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:46:15.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.047638 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:46:15.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.056966 systemd[1]: Reached target network-pre.target. Apr 12 18:46:15.066834 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:46:15.076666 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:46:15.084200 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:46:15.087470 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:46:15.096090 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:46:15.104236 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:46:15.106309 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:46:15.109797 systemd-journald[993]: Time spent on flushing to /var/log/journal/9c42b30454fc32d53fb078c4f24afe3c is 83.075ms for 1158 entries. Apr 12 18:46:15.109797 systemd-journald[993]: System Journal (/var/log/journal/9c42b30454fc32d53fb078c4f24afe3c) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:46:15.222430 systemd-journald[993]: Received client request to flush runtime journal. Apr 12 18:46:15.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.121238 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:46:15.123131 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:46:15.132387 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:46:15.224893 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:46:15.141073 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:46:15.151527 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:46:15.160451 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:46:15.167356 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:46:15.181343 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:46:15.191868 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:46:15.209137 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:46:15.223765 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:46:15.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.807747 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:46:15.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.816000 audit: BPF prog-id=21 op=LOAD Apr 12 18:46:15.816000 audit: BPF prog-id=22 op=LOAD Apr 12 18:46:15.816000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:46:15.816000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:46:15.818167 systemd[1]: Starting systemd-udevd.service... Apr 12 18:46:15.841937 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Apr 12 18:46:15.890702 systemd[1]: Started systemd-udevd.service. Apr 12 18:46:15.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:15.900000 audit: BPF prog-id=23 op=LOAD Apr 12 18:46:15.903148 systemd[1]: Starting systemd-networkd.service... Apr 12 18:46:15.915000 audit: BPF prog-id=24 op=LOAD Apr 12 18:46:15.915000 audit: BPF prog-id=25 op=LOAD Apr 12 18:46:15.915000 audit: BPF prog-id=26 op=LOAD Apr 12 18:46:15.917516 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:46:15.961684 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:46:16.000059 systemd[1]: Started systemd-userdbd.service. Apr 12 18:46:16.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.080052 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:46:16.109861 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:46:16.110014 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Apr 12 18:46:16.127096 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 18:46:16.148202 systemd-networkd[1025]: lo: Link UP Apr 12 18:46:16.148215 systemd-networkd[1025]: lo: Gained carrier Apr 12 18:46:16.148973 systemd-networkd[1025]: Enumeration completed Apr 12 18:46:16.149129 systemd[1]: Started systemd-networkd.service. Apr 12 18:46:16.149859 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:46:16.152323 systemd-networkd[1025]: eth0: Link UP Apr 12 18:46:16.152340 systemd-networkd[1025]: eth0: Gained carrier Apr 12 18:46:16.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.161210 systemd-networkd[1025]: eth0: DHCPv4 address 10.128.0.4/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:46:16.175056 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1019) Apr 12 18:46:16.216046 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:46:16.209000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:46:16.209000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559922dd1ea0 a1=32194 a2=7fbdb1d5fbc5 a3=5 items=108 ppid=1011 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:16.209000 audit: CWD cwd="/" Apr 12 18:46:16.209000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=1 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=2 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=3 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=4 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=5 name=(null) inode=14155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=6 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=7 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=8 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=9 name=(null) inode=14157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=10 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=11 name=(null) inode=14158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=12 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=13 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=14 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=15 name=(null) inode=14160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=16 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=17 name=(null) inode=14161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=18 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=19 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=20 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=21 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=22 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=23 name=(null) inode=14164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=24 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=25 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=26 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=27 name=(null) inode=14166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=28 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=29 name=(null) inode=14167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=30 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=31 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=32 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=33 name=(null) inode=14169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=34 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=35 name=(null) inode=14170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=36 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=37 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=38 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=39 name=(null) inode=14172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=40 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=41 name=(null) inode=14173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=42 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=43 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=44 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=45 name=(null) inode=14175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=46 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=47 name=(null) inode=14176 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=48 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=49 name=(null) inode=14177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=50 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=51 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=52 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=53 name=(null) inode=14179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=55 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=56 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=57 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=58 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=59 name=(null) inode=14182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=60 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.235096 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:46:16.209000 audit: PATH item=61 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=62 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=63 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=64 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=65 name=(null) inode=14185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=66 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=67 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=68 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=69 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=70 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=71 name=(null) inode=14188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=72 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=73 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=74 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=75 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=76 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=77 name=(null) inode=14191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=78 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=79 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=80 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=81 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=82 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=83 name=(null) inode=14194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=84 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=85 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=86 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=87 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=88 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=89 name=(null) inode=14197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=90 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=91 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=92 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=93 name=(null) inode=14199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=94 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=95 name=(null) inode=14200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=96 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=97 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=98 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=99 name=(null) inode=14202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=100 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=101 name=(null) inode=14203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=102 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=103 name=(null) inode=14204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=104 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=105 name=(null) inode=14205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=106 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PATH item=107 name=(null) inode=14206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:16.209000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:46:16.274068 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Apr 12 18:46:16.288107 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Apr 12 18:46:16.303068 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:46:16.318550 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:46:16.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.329934 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:46:16.361009 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:46:16.395441 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:46:16.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.405405 systemd[1]: Reached target cryptsetup.target. Apr 12 18:46:16.415825 systemd[1]: Starting lvm2-activation.service... Apr 12 18:46:16.421366 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:46:16.450412 systemd[1]: Finished lvm2-activation.service. Apr 12 18:46:16.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.459391 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:46:16.468165 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:46:16.468214 systemd[1]: Reached target local-fs.target. Apr 12 18:46:16.476181 systemd[1]: Reached target machines.target. Apr 12 18:46:16.485848 systemd[1]: Starting ldconfig.service... Apr 12 18:46:16.494293 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:46:16.494385 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:46:16.496103 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:46:16.504799 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:46:16.516802 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:46:16.517159 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:46:16.517259 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:46:16.519051 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:46:16.519837 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Apr 12 18:46:16.522325 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:46:16.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.551846 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:46:16.570221 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:46:16.582937 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:46:16.595897 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:46:16.702425 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) Apr 12 18:46:16.702425 systemd-fsck[1060]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 18:46:16.707181 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:46:16.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.721306 systemd[1]: Mounting boot.mount... Apr 12 18:46:16.750825 systemd[1]: Mounted boot.mount. Apr 12 18:46:16.781711 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:46:16.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.881497 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:46:16.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.892314 systemd[1]: Starting audit-rules.service... Apr 12 18:46:16.901269 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:46:16.912631 systemd[1]: Starting oem-gce-enable-oslogin.service... Apr 12 18:46:16.924602 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:46:16.934000 audit: BPF prog-id=27 op=LOAD Apr 12 18:46:16.950192 systemd[1]: Starting systemd-resolved.service... Apr 12 18:46:16.957000 audit: BPF prog-id=28 op=LOAD Apr 12 18:46:16.960347 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:46:16.968921 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:46:16.977017 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:46:16.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:16.985910 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:46:17.047000 audit[1085]: SYSTEM_BOOT pid=1085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:46:17.050367 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:46:17.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:17.060695 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Apr 12 18:46:17.060953 systemd[1]: Finished oem-gce-enable-oslogin.service. Apr 12 18:46:17.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:17.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:17.069646 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:46:17.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:17.084000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:46:17.084000 audit[1097]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc9953ae0 a2=420 a3=0 items=0 ppid=1063 pid=1097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:17.084000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:46:17.088388 augenrules[1097]: No rules Apr 12 18:46:17.089203 systemd[1]: Finished audit-rules.service. Apr 12 18:46:17.131454 systemd-resolved[1079]: Positive Trust Anchors: Apr 12 18:46:17.131943 systemd-resolved[1079]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:46:17.132141 systemd-resolved[1079]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:46:17.137918 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:46:17.138698 systemd-timesyncd[1083]: Contacted time server 169.254.169.254:123 (169.254.169.254). Apr 12 18:46:17.138768 systemd-timesyncd[1083]: Initial clock synchronization to Fri 2024-04-12 18:46:17.357914 UTC. Apr 12 18:46:17.146374 systemd[1]: Reached target time-set.target. Apr 12 18:46:17.245361 systemd-resolved[1079]: Defaulting to hostname 'linux'. Apr 12 18:46:17.248049 systemd[1]: Started systemd-resolved.service. Apr 12 18:46:17.256271 systemd[1]: Reached target network.target. Apr 12 18:46:17.265193 systemd[1]: Reached target nss-lookup.target. Apr 12 18:46:17.295621 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:46:17.396064 systemd[1]: Finished ldconfig.service. Apr 12 18:46:17.406118 systemd[1]: Starting systemd-update-done.service... Apr 12 18:46:17.415414 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:46:17.416415 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:46:17.425445 systemd[1]: Finished systemd-update-done.service. Apr 12 18:46:17.434328 systemd[1]: Reached target sysinit.target. Apr 12 18:46:17.443249 systemd[1]: Started motdgen.path. Apr 12 18:46:17.450172 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:46:17.460351 systemd[1]: Started logrotate.timer. Apr 12 18:46:17.467273 systemd[1]: Started mdadm.timer. Apr 12 18:46:17.474145 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:46:17.482144 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:46:17.482199 systemd[1]: Reached target paths.target. Apr 12 18:46:17.489166 systemd[1]: Reached target timers.target. Apr 12 18:46:17.496616 systemd[1]: Listening on dbus.socket. Apr 12 18:46:17.505577 systemd[1]: Starting docker.socket... Apr 12 18:46:17.517457 systemd[1]: Listening on sshd.socket. Apr 12 18:46:17.524352 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:46:17.525112 systemd[1]: Listening on docker.socket. Apr 12 18:46:17.532337 systemd[1]: Reached target sockets.target. Apr 12 18:46:17.541163 systemd[1]: Reached target basic.target. Apr 12 18:46:17.548228 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:46:17.548274 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:46:17.549864 systemd[1]: Starting containerd.service... Apr 12 18:46:17.558590 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:46:17.567042 systemd[1]: Starting dbus.service... Apr 12 18:46:17.575055 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:46:17.584153 systemd[1]: Starting extend-filesystems.service... Apr 12 18:46:17.592183 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:46:17.594130 systemd[1]: Starting motdgen.service... Apr 12 18:46:17.603598 jq[1111]: false Apr 12 18:46:17.602942 systemd[1]: Starting oem-gce.service... Apr 12 18:46:17.611527 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:46:17.620114 systemd[1]: Starting prepare-critools.service... Apr 12 18:46:17.631174 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:46:17.637057 extend-filesystems[1112]: Found sda Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda1 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda2 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda3 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found usr Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda4 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda6 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda7 Apr 12 18:46:17.645231 extend-filesystems[1112]: Found sda9 Apr 12 18:46:17.645231 extend-filesystems[1112]: Checking size of /dev/sda9 Apr 12 18:46:17.945909 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Apr 12 18:46:17.945985 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Apr 12 18:46:17.946047 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:46:17.640383 systemd[1]: Starting sshd-keygen.service... Apr 12 18:46:17.783421 dbus-daemon[1110]: [system] SELinux support is enabled Apr 12 18:46:17.948166 extend-filesystems[1112]: Resized partition /dev/sda9 Apr 12 18:46:17.991603 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:46:17.649673 systemd[1]: Starting systemd-logind.service... Apr 12 18:46:17.804218 dbus-daemon[1110]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1025 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:46:17.991948 extend-filesystems[1142]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:46:17.991948 extend-filesystems[1142]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 18:46:17.991948 extend-filesystems[1142]: old_desc_blocks = 1, new_desc_blocks = 2 Apr 12 18:46:17.991948 extend-filesystems[1142]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Apr 12 18:46:17.663524 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:46:17.820710 dbus-daemon[1110]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:46:18.047065 extend-filesystems[1112]: Resized filesystem in /dev/sda9 Apr 12 18:46:17.663636 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Apr 12 18:46:18.065445 update_engine[1135]: I0412 18:46:17.905591 1135 main.cc:92] Flatcar Update Engine starting Apr 12 18:46:18.065445 update_engine[1135]: I0412 18:46:17.919994 1135 update_check_scheduler.cc:74] Next update check in 8m11s Apr 12 18:46:17.664480 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:46:18.067228 jq[1137]: true Apr 12 18:46:17.665891 systemd[1]: Starting update-engine.service... Apr 12 18:46:17.684344 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:46:17.691116 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:46:18.069561 tar[1145]: crictl Apr 12 18:46:17.691980 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:46:18.071302 tar[1144]: ./ Apr 12 18:46:18.071302 tar[1144]: ./loopback Apr 12 18:46:17.692566 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:46:17.692962 systemd[1]: Finished motdgen.service. Apr 12 18:46:18.072634 jq[1148]: true Apr 12 18:46:17.722946 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:46:18.074294 mkfs.ext4[1150]: mke2fs 1.46.5 (30-Dec-2021) Apr 12 18:46:18.074294 mkfs.ext4[1150]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Apr 12 18:46:18.074294 mkfs.ext4[1150]: Creating filesystem with 262144 4k blocks and 65536 inodes Apr 12 18:46:18.074294 mkfs.ext4[1150]: Filesystem UUID: d1cdf663-305a-4bd1-9842-b2cf87b92d06 Apr 12 18:46:18.074294 mkfs.ext4[1150]: Superblock backups stored on blocks: Apr 12 18:46:18.074294 mkfs.ext4[1150]: 32768, 98304, 163840, 229376 Apr 12 18:46:18.074294 mkfs.ext4[1150]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:46:18.074294 mkfs.ext4[1150]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:46:18.074294 mkfs.ext4[1150]: Creating journal (8192 blocks): done Apr 12 18:46:18.074294 mkfs.ext4[1150]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:46:17.723400 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:46:17.784080 systemd[1]: Started dbus.service. Apr 12 18:46:18.075781 bash[1180]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:46:17.819353 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:46:17.819401 systemd[1]: Reached target system-config.target. Apr 12 18:46:18.077250 umount[1160]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Apr 12 18:46:17.847241 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:46:17.847280 systemd[1]: Reached target user-config.target. Apr 12 18:46:17.869889 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:46:17.880722 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:46:17.880991 systemd[1]: Finished extend-filesystems.service. Apr 12 18:46:17.966118 systemd[1]: Started update-engine.service. Apr 12 18:46:17.967009 systemd-networkd[1025]: eth0: Gained IPv6LL Apr 12 18:46:17.984607 systemd[1]: Started locksmithd.service. Apr 12 18:46:18.121624 env[1149]: time="2024-04-12T18:46:18.112415818Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:46:18.032156 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:46:18.143772 tar[1144]: ./bandwidth Apr 12 18:46:18.145097 dbus-daemon[1110]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:46:18.145334 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:46:18.145931 dbus-daemon[1110]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1168 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:46:18.158355 systemd[1]: Starting polkit.service... Apr 12 18:46:18.189395 systemd-logind[1131]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:46:18.194169 systemd-logind[1131]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 18:46:18.194428 systemd-logind[1131]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:46:18.195645 systemd-logind[1131]: New seat seat0. Apr 12 18:46:18.210379 systemd[1]: Started systemd-logind.service. Apr 12 18:46:18.351840 coreos-metadata[1109]: Apr 12 18:46:18.351 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Apr 12 18:46:18.358807 coreos-metadata[1109]: Apr 12 18:46:18.358 INFO Fetch failed with 404: resource not found Apr 12 18:46:18.359112 coreos-metadata[1109]: Apr 12 18:46:18.358 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Apr 12 18:46:18.360880 polkitd[1186]: Started polkitd version 121 Apr 12 18:46:18.362799 coreos-metadata[1109]: Apr 12 18:46:18.362 INFO Fetch successful Apr 12 18:46:18.363099 coreos-metadata[1109]: Apr 12 18:46:18.362 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Apr 12 18:46:18.364380 coreos-metadata[1109]: Apr 12 18:46:18.364 INFO Fetch failed with 404: resource not found Apr 12 18:46:18.365489 coreos-metadata[1109]: Apr 12 18:46:18.364 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Apr 12 18:46:18.366811 coreos-metadata[1109]: Apr 12 18:46:18.366 INFO Fetch failed with 404: resource not found Apr 12 18:46:18.367108 coreos-metadata[1109]: Apr 12 18:46:18.366 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Apr 12 18:46:18.368795 coreos-metadata[1109]: Apr 12 18:46:18.368 INFO Fetch successful Apr 12 18:46:18.372441 unknown[1109]: wrote ssh authorized keys file for user: core Apr 12 18:46:18.389755 env[1149]: time="2024-04-12T18:46:18.389686173Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:46:18.389924 env[1149]: time="2024-04-12T18:46:18.389891181Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.394118 env[1149]: time="2024-04-12T18:46:18.394065718Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:46:18.394118 env[1149]: time="2024-04-12T18:46:18.394116274Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.396266 polkitd[1186]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:46:18.396623 polkitd[1186]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:46:18.397630 env[1149]: time="2024-04-12T18:46:18.397582886Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:46:18.397924 env[1149]: time="2024-04-12T18:46:18.397630142Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.397924 env[1149]: time="2024-04-12T18:46:18.397654346Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:46:18.397924 env[1149]: time="2024-04-12T18:46:18.397670923Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.398106 env[1149]: time="2024-04-12T18:46:18.398083603Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.398614 env[1149]: time="2024-04-12T18:46:18.398557799Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:46:18.399081 env[1149]: time="2024-04-12T18:46:18.398845104Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:46:18.399081 env[1149]: time="2024-04-12T18:46:18.398877555Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:46:18.399203 env[1149]: time="2024-04-12T18:46:18.399137120Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:46:18.399203 env[1149]: time="2024-04-12T18:46:18.399165286Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:46:18.400807 polkitd[1186]: Finished loading, compiling and executing 2 rules Apr 12 18:46:18.401687 dbus-daemon[1110]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:46:18.401948 systemd[1]: Started polkit.service. Apr 12 18:46:18.402899 polkitd[1186]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:46:18.407135 update-ssh-keys[1187]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407118844Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407163293Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407188656Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407251951Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407278430Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407369296Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407393852Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407416553Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407441485Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407463505Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407485859Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.407520 env[1149]: time="2024-04-12T18:46:18.407511168Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:46:18.408095 env[1149]: time="2024-04-12T18:46:18.407660715Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:46:18.408095 env[1149]: time="2024-04-12T18:46:18.407782663Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:46:18.408480 env[1149]: time="2024-04-12T18:46:18.408320600Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:46:18.408480 env[1149]: time="2024-04-12T18:46:18.408370390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408480 env[1149]: time="2024-04-12T18:46:18.408393505Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:46:18.408480 env[1149]: time="2024-04-12T18:46:18.408472278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408496413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408603972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408630363Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408662818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408688858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408710224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408733522Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.408784 env[1149]: time="2024-04-12T18:46:18.408758751Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.408937437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.408963634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.408987177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.409009031Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.409056242Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.409078869Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.409114724Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:46:18.409247 env[1149]: time="2024-04-12T18:46:18.409209546Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:46:18.409639 env[1149]: time="2024-04-12T18:46:18.409542670Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:46:18.413760 env[1149]: time="2024-04-12T18:46:18.409654850Z" level=info msg="Connect containerd service" Apr 12 18:46:18.413760 env[1149]: time="2024-04-12T18:46:18.409715196Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:46:18.413760 env[1149]: time="2024-04-12T18:46:18.412224369Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:46:18.413760 env[1149]: time="2024-04-12T18:46:18.412969987Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:46:18.411000 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:46:18.423772 env[1149]: time="2024-04-12T18:46:18.413042134Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:46:18.423941 systemd[1]: Started containerd.service. Apr 12 18:46:18.424288 env[1149]: time="2024-04-12T18:46:18.424249814Z" level=info msg="containerd successfully booted in 0.313008s" Apr 12 18:46:18.432509 env[1149]: time="2024-04-12T18:46:18.432441656Z" level=info msg="Start subscribing containerd event" Apr 12 18:46:18.432633 env[1149]: time="2024-04-12T18:46:18.432547642Z" level=info msg="Start recovering state" Apr 12 18:46:18.432698 env[1149]: time="2024-04-12T18:46:18.432658506Z" level=info msg="Start event monitor" Apr 12 18:46:18.432757 env[1149]: time="2024-04-12T18:46:18.432702184Z" level=info msg="Start snapshots syncer" Apr 12 18:46:18.432757 env[1149]: time="2024-04-12T18:46:18.432721754Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:46:18.432757 env[1149]: time="2024-04-12T18:46:18.432743232Z" level=info msg="Start streaming server" Apr 12 18:46:18.441817 tar[1144]: ./ptp Apr 12 18:46:18.445580 systemd-hostnamed[1168]: Hostname set to (transient) Apr 12 18:46:18.448589 systemd-resolved[1079]: System hostname changed to 'ci-3510-3-3-fa27bb017469265c2911.c.flatcar-212911.internal'. Apr 12 18:46:18.566253 tar[1144]: ./vlan Apr 12 18:46:18.688475 tar[1144]: ./host-device Apr 12 18:46:18.795916 tar[1144]: ./tuning Apr 12 18:46:18.902465 tar[1144]: ./vrf Apr 12 18:46:19.012226 tar[1144]: ./sbr Apr 12 18:46:19.121107 tar[1144]: ./tap Apr 12 18:46:19.243470 tar[1144]: ./dhcp Apr 12 18:46:19.552517 tar[1144]: ./static Apr 12 18:46:19.601476 systemd[1]: Finished prepare-critools.service. Apr 12 18:46:19.620174 tar[1144]: ./firewall Apr 12 18:46:19.687094 tar[1144]: ./macvlan Apr 12 18:46:19.788381 tar[1144]: ./dummy Apr 12 18:46:19.895414 tar[1144]: ./bridge Apr 12 18:46:19.961201 tar[1144]: ./ipvlan Apr 12 18:46:20.081335 tar[1144]: ./portmap Apr 12 18:46:20.173754 tar[1144]: ./host-local Apr 12 18:46:20.297705 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:46:22.379852 sshd_keygen[1136]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:46:22.391931 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:46:22.434634 systemd[1]: Finished sshd-keygen.service. Apr 12 18:46:22.445779 systemd[1]: Starting issuegen.service... Apr 12 18:46:22.457959 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:46:22.458228 systemd[1]: Finished issuegen.service. Apr 12 18:46:22.467856 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:46:22.480919 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:46:22.491667 systemd[1]: Started getty@tty1.service. Apr 12 18:46:22.501613 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:46:22.510585 systemd[1]: Reached target getty.target. Apr 12 18:46:23.900799 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Apr 12 18:46:25.913087 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:46:25.939622 systemd-nspawn[1217]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Apr 12 18:46:25.939622 systemd-nspawn[1217]: Press ^] three times within 1s to kill container. Apr 12 18:46:25.959104 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:46:26.043946 systemd[1]: Started oem-gce.service. Apr 12 18:46:26.051721 systemd[1]: Reached target multi-user.target. Apr 12 18:46:26.062430 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:46:26.075569 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:46:26.075847 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:46:26.086412 systemd[1]: Startup finished in 1.010s (kernel) + 8.519s (initrd) + 15.758s (userspace) = 25.289s. Apr 12 18:46:26.155241 systemd-nspawn[1217]: + '[' -e /etc/default/instance_configs.cfg.template ']' Apr 12 18:46:26.155241 systemd-nspawn[1217]: + echo -e '[InstanceSetup]\nset_host_keys = false' Apr 12 18:46:26.155499 systemd-nspawn[1217]: + /usr/bin/google_instance_setup Apr 12 18:46:26.810774 instance-setup[1223]: INFO Running google_set_multiqueue. Apr 12 18:46:26.827914 instance-setup[1223]: INFO Set channels for eth0 to 2. Apr 12 18:46:26.831834 instance-setup[1223]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Apr 12 18:46:26.833197 instance-setup[1223]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Apr 12 18:46:26.833669 instance-setup[1223]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Apr 12 18:46:26.835146 instance-setup[1223]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Apr 12 18:46:26.835509 instance-setup[1223]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Apr 12 18:46:26.836850 instance-setup[1223]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Apr 12 18:46:26.837327 instance-setup[1223]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Apr 12 18:46:26.838760 instance-setup[1223]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Apr 12 18:46:26.852052 instance-setup[1223]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Apr 12 18:46:26.852236 instance-setup[1223]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Apr 12 18:46:26.891991 systemd-nspawn[1217]: + /usr/bin/google_metadata_script_runner --script-type startup Apr 12 18:46:27.229355 startup-script[1254]: INFO Starting startup scripts. Apr 12 18:46:27.243381 startup-script[1254]: INFO No startup scripts found in metadata. Apr 12 18:46:27.243550 startup-script[1254]: INFO Finished running startup scripts. Apr 12 18:46:27.278947 systemd-nspawn[1217]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Apr 12 18:46:27.278947 systemd-nspawn[1217]: + daemon_pids=() Apr 12 18:46:27.278947 systemd-nspawn[1217]: + for d in accounts clock_skew network Apr 12 18:46:27.279833 systemd-nspawn[1217]: + daemon_pids+=($!) Apr 12 18:46:27.279998 systemd-nspawn[1217]: + for d in accounts clock_skew network Apr 12 18:46:27.279998 systemd-nspawn[1217]: + /usr/bin/google_accounts_daemon Apr 12 18:46:27.280497 systemd-nspawn[1217]: + daemon_pids+=($!) Apr 12 18:46:27.280497 systemd-nspawn[1217]: + for d in accounts clock_skew network Apr 12 18:46:27.280916 systemd-nspawn[1217]: + daemon_pids+=($!) Apr 12 18:46:27.281123 systemd-nspawn[1217]: + NOTIFY_SOCKET=/run/systemd/notify Apr 12 18:46:27.281123 systemd-nspawn[1217]: + /usr/bin/systemd-notify --ready Apr 12 18:46:27.282174 systemd-nspawn[1217]: + /usr/bin/google_clock_skew_daemon Apr 12 18:46:27.282900 systemd-nspawn[1217]: + /usr/bin/google_network_daemon Apr 12 18:46:27.343610 systemd-nspawn[1217]: + wait -n 36 37 38 Apr 12 18:46:27.384498 systemd[1]: Created slice system-sshd.slice. Apr 12 18:46:27.390759 systemd[1]: Started sshd@0-10.128.0.4:22-139.178.89.65:58326.service. Apr 12 18:46:27.777273 sshd[1262]: Accepted publickey for core from 139.178.89.65 port 58326 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:27.780813 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:27.801004 systemd[1]: Created slice user-500.slice. Apr 12 18:46:27.803049 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:46:27.811031 systemd-logind[1131]: New session 1 of user core. Apr 12 18:46:27.821482 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:46:27.824069 systemd[1]: Starting user@500.service... Apr 12 18:46:27.842731 (systemd)[1266]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:28.068674 systemd[1266]: Queued start job for default target default.target. Apr 12 18:46:28.069644 systemd[1266]: Reached target paths.target. Apr 12 18:46:28.069721 systemd[1266]: Reached target sockets.target. Apr 12 18:46:28.069747 systemd[1266]: Reached target timers.target. Apr 12 18:46:28.069771 systemd[1266]: Reached target basic.target. Apr 12 18:46:28.069856 systemd[1266]: Reached target default.target. Apr 12 18:46:28.069913 systemd[1266]: Startup finished in 210ms. Apr 12 18:46:28.069953 systemd[1]: Started user@500.service. Apr 12 18:46:28.071694 systemd[1]: Started session-1.scope. Apr 12 18:46:28.161250 google-clock-skew[1258]: INFO Starting Google Clock Skew daemon. Apr 12 18:46:28.175821 google-clock-skew[1258]: INFO Clock drift token has changed: 0. Apr 12 18:46:28.180753 systemd-nspawn[1217]: hwclock: Cannot access the Hardware Clock via any known method. Apr 12 18:46:28.180753 systemd-nspawn[1217]: hwclock: Use the --verbose option to see the details of our search for an access method. Apr 12 18:46:28.181646 google-clock-skew[1258]: WARNING Failed to sync system time with hardware clock. Apr 12 18:46:28.189260 groupadd[1278]: group added to /etc/group: name=google-sudoers, GID=1000 Apr 12 18:46:28.192801 groupadd[1278]: group added to /etc/gshadow: name=google-sudoers Apr 12 18:46:28.197054 groupadd[1278]: new group: name=google-sudoers, GID=1000 Apr 12 18:46:28.197796 google-networking[1259]: INFO Starting Google Networking daemon. Apr 12 18:46:28.214010 google-accounts[1257]: INFO Starting Google Accounts daemon. Apr 12 18:46:28.245930 google-accounts[1257]: WARNING OS Login not installed. Apr 12 18:46:28.247381 google-accounts[1257]: INFO Creating a new user account for 0. Apr 12 18:46:28.258197 google-accounts[1257]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Apr 12 18:46:28.260303 systemd-nspawn[1217]: useradd: invalid user name '0': use --badname to ignore Apr 12 18:46:28.339321 systemd[1]: Started sshd@1-10.128.0.4:22-139.178.89.65:58328.service. Apr 12 18:46:28.682958 sshd[1292]: Accepted publickey for core from 139.178.89.65 port 58328 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:28.684911 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:28.691239 systemd-logind[1131]: New session 2 of user core. Apr 12 18:46:28.691992 systemd[1]: Started session-2.scope. Apr 12 18:46:28.941261 sshd[1292]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:28.945667 systemd[1]: sshd@1-10.128.0.4:22-139.178.89.65:58328.service: Deactivated successfully. Apr 12 18:46:28.946754 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:46:28.947595 systemd-logind[1131]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:46:28.948839 systemd-logind[1131]: Removed session 2. Apr 12 18:46:28.996913 systemd[1]: Started sshd@2-10.128.0.4:22-139.178.89.65:58342.service. Apr 12 18:46:29.339148 sshd[1299]: Accepted publickey for core from 139.178.89.65 port 58342 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:29.341360 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:29.347923 systemd[1]: Started session-3.scope. Apr 12 18:46:29.348547 systemd-logind[1131]: New session 3 of user core. Apr 12 18:46:29.586206 sshd[1299]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:29.590522 systemd[1]: sshd@2-10.128.0.4:22-139.178.89.65:58342.service: Deactivated successfully. Apr 12 18:46:29.591643 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:46:29.592589 systemd-logind[1131]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:46:29.593952 systemd-logind[1131]: Removed session 3. Apr 12 18:46:29.640572 systemd[1]: Started sshd@3-10.128.0.4:22-139.178.89.65:58358.service. Apr 12 18:46:29.981613 sshd[1305]: Accepted publickey for core from 139.178.89.65 port 58358 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:29.983133 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:29.990132 systemd[1]: Started session-4.scope. Apr 12 18:46:29.991151 systemd-logind[1131]: New session 4 of user core. Apr 12 18:46:30.232555 sshd[1305]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:30.237144 systemd[1]: sshd@3-10.128.0.4:22-139.178.89.65:58358.service: Deactivated successfully. Apr 12 18:46:30.238247 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:46:30.239121 systemd-logind[1131]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:46:30.240348 systemd-logind[1131]: Removed session 4. Apr 12 18:46:30.287367 systemd[1]: Started sshd@4-10.128.0.4:22-139.178.89.65:58370.service. Apr 12 18:46:30.628092 sshd[1311]: Accepted publickey for core from 139.178.89.65 port 58370 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:30.630284 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:30.636912 systemd[1]: Started session-5.scope. Apr 12 18:46:30.637547 systemd-logind[1131]: New session 5 of user core. Apr 12 18:46:30.851751 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:46:30.852175 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:46:30.862291 dbus-daemon[1110]: \xd0\xed\x98_\xf6U: received setenforce notice (enforcing=407260224) Apr 12 18:46:30.864435 sudo[1314]: pam_unix(sudo:session): session closed for user root Apr 12 18:46:30.917830 sshd[1311]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:30.922657 systemd[1]: sshd@4-10.128.0.4:22-139.178.89.65:58370.service: Deactivated successfully. Apr 12 18:46:30.923882 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:46:30.924819 systemd-logind[1131]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:46:30.926213 systemd-logind[1131]: Removed session 5. Apr 12 18:46:30.974552 systemd[1]: Started sshd@5-10.128.0.4:22-139.178.89.65:58372.service. Apr 12 18:46:31.319703 sshd[1318]: Accepted publickey for core from 139.178.89.65 port 58372 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:31.321272 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:31.327953 systemd[1]: Started session-6.scope. Apr 12 18:46:31.328947 systemd-logind[1131]: New session 6 of user core. Apr 12 18:46:31.526129 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:46:31.526534 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:46:31.530765 sudo[1322]: pam_unix(sudo:session): session closed for user root Apr 12 18:46:31.543201 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:46:31.543613 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:46:31.556192 systemd[1]: Stopping audit-rules.service... Apr 12 18:46:31.557000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:46:31.563787 kernel: kauditd_printk_skb: 185 callbacks suppressed Apr 12 18:46:31.563895 kernel: audit: type=1305 audit(1712947591.557:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:46:31.563937 auditctl[1325]: No rules Apr 12 18:46:31.567496 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:46:31.567747 systemd[1]: Stopped audit-rules.service. Apr 12 18:46:31.570338 systemd[1]: Starting audit-rules.service... Apr 12 18:46:31.557000 audit[1325]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd89da4b20 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:31.609405 kernel: audit: type=1300 audit(1712947591.557:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd89da4b20 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:31.609550 kernel: audit: type=1327 audit(1712947591.557:167): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:46:31.557000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:46:31.609845 augenrules[1342]: No rules Apr 12 18:46:31.611408 systemd[1]: Finished audit-rules.service. Apr 12 18:46:31.615143 sudo[1321]: pam_unix(sudo:session): session closed for user root Apr 12 18:46:31.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.641197 kernel: audit: type=1131 audit(1712947591.566:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.641365 kernel: audit: type=1130 audit(1712947591.610:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.614000 audit[1321]: USER_END pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.664068 kernel: audit: type=1106 audit(1712947591.614:170): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.614000 audit[1321]: CRED_DISP pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.696941 systemd-logind[1131]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:46:31.692379 sshd[1318]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:31.698977 systemd[1]: sshd@5-10.128.0.4:22-139.178.89.65:58372.service: Deactivated successfully. Apr 12 18:46:31.700116 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:46:31.701959 systemd-logind[1131]: Removed session 6. Apr 12 18:46:31.692000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:31.746528 kernel: audit: type=1104 audit(1712947591.614:171): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.746677 kernel: audit: type=1106 audit(1712947591.692:172): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:31.746719 kernel: audit: type=1104 audit(1712947591.692:173): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:31.692000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:31.769913 systemd[1]: Started sshd@6-10.128.0.4:22-139.178.89.65:58378.service. Apr 12 18:46:31.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.4:22-139.178.89.65:58372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.4:22-139.178.89.65:58378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:31.797110 kernel: audit: type=1131 audit(1712947591.698:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.4:22-139.178.89.65:58372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:32.118000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:32.120296 sshd[1348]: Accepted publickey for core from 139.178.89.65 port 58378 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:32.120000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:32.120000 audit[1348]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdcca2e30 a2=3 a3=0 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:32.122321 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:32.129299 systemd[1]: Started session-7.scope. Apr 12 18:46:32.129923 systemd-logind[1131]: New session 7 of user core. Apr 12 18:46:32.139000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:32.141000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:32.327000 audit[1351]: USER_ACCT pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:32.329115 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:46:32.328000 audit[1351]: CRED_REFR pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:32.329544 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:46:32.331000 audit[1351]: USER_START pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:32.914356 systemd[1]: Reloading. Apr 12 18:46:33.022112 /usr/lib/systemd/system-generators/torcx-generator[1380]: time="2024-04-12T18:46:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:46:33.022161 /usr/lib/systemd/system-generators/torcx-generator[1380]: time="2024-04-12T18:46:33Z" level=info msg="torcx already run" Apr 12 18:46:33.122219 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:46:33.122246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:46:33.146293 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.234000 audit: BPF prog-id=37 op=LOAD Apr 12 18:46:33.234000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.237000 audit: BPF prog-id=38 op=LOAD Apr 12 18:46:33.237000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit: BPF prog-id=39 op=LOAD Apr 12 18:46:33.239000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit: BPF prog-id=40 op=LOAD Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.239000 audit: BPF prog-id=41 op=LOAD Apr 12 18:46:33.239000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:46:33.239000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.242000 audit: BPF prog-id=42 op=LOAD Apr 12 18:46:33.243000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit: BPF prog-id=43 op=LOAD Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.243000 audit: BPF prog-id=44 op=LOAD Apr 12 18:46:33.243000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:46:33.243000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit: BPF prog-id=45 op=LOAD Apr 12 18:46:33.274000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit: BPF prog-id=46 op=LOAD Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.274000 audit: BPF prog-id=47 op=LOAD Apr 12 18:46:33.274000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:46:33.274000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit: BPF prog-id=48 op=LOAD Apr 12 18:46:33.278000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit: BPF prog-id=49 op=LOAD Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.279000 audit: BPF prog-id=50 op=LOAD Apr 12 18:46:33.279000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:46:33.279000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.283000 audit: BPF prog-id=51 op=LOAD Apr 12 18:46:33.283000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.284000 audit: BPF prog-id=52 op=LOAD Apr 12 18:46:33.284000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit: BPF prog-id=53 op=LOAD Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:33.285000 audit: BPF prog-id=54 op=LOAD Apr 12 18:46:33.285000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:46:33.285000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:46:33.308239 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:46:33.317930 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:46:33.318628 systemd[1]: Reached target network-online.target. Apr 12 18:46:33.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:33.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:33.320864 systemd[1]: Started kubelet.service. Apr 12 18:46:33.340714 systemd[1]: Starting coreos-metadata.service... Apr 12 18:46:33.422536 coreos-metadata[1433]: Apr 12 18:46:33.422 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Apr 12 18:46:33.424284 coreos-metadata[1433]: Apr 12 18:46:33.424 INFO Fetch successful Apr 12 18:46:33.424443 coreos-metadata[1433]: Apr 12 18:46:33.424 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Apr 12 18:46:33.425228 coreos-metadata[1433]: Apr 12 18:46:33.425 INFO Fetch successful Apr 12 18:46:33.425343 coreos-metadata[1433]: Apr 12 18:46:33.425 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Apr 12 18:46:33.426066 coreos-metadata[1433]: Apr 12 18:46:33.426 INFO Fetch successful Apr 12 18:46:33.426253 coreos-metadata[1433]: Apr 12 18:46:33.426 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Apr 12 18:46:33.426841 coreos-metadata[1433]: Apr 12 18:46:33.426 INFO Fetch successful Apr 12 18:46:33.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:33.439238 systemd[1]: Finished coreos-metadata.service. Apr 12 18:46:33.452816 kubelet[1424]: E0412 18:46:33.452745 1424 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:46:33.456715 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:46:33.456952 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:46:33.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:46:33.887511 systemd[1]: Stopped kubelet.service. Apr 12 18:46:33.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:33.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:33.911361 systemd[1]: Reloading. Apr 12 18:46:34.026849 /usr/lib/systemd/system-generators/torcx-generator[1492]: time="2024-04-12T18:46:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:46:34.026897 /usr/lib/systemd/system-generators/torcx-generator[1492]: time="2024-04-12T18:46:34Z" level=info msg="torcx already run" Apr 12 18:46:34.114365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:46:34.114394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:46:34.138803 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.229000 audit: BPF prog-id=55 op=LOAD Apr 12 18:46:34.229000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.232000 audit: BPF prog-id=56 op=LOAD Apr 12 18:46:34.232000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit: BPF prog-id=57 op=LOAD Apr 12 18:46:34.233000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit: BPF prog-id=58 op=LOAD Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.233000 audit: BPF prog-id=59 op=LOAD Apr 12 18:46:34.233000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:46:34.233000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.236000 audit: BPF prog-id=60 op=LOAD Apr 12 18:46:34.236000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:46:34.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit: BPF prog-id=61 op=LOAD Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.237000 audit: BPF prog-id=62 op=LOAD Apr 12 18:46:34.237000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:46:34.237000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.238000 audit: BPF prog-id=63 op=LOAD Apr 12 18:46:34.238000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit: BPF prog-id=64 op=LOAD Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.239000 audit: BPF prog-id=65 op=LOAD Apr 12 18:46:34.239000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:46:34.239000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.240000 audit: BPF prog-id=66 op=LOAD Apr 12 18:46:34.240000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit: BPF prog-id=67 op=LOAD Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.241000 audit: BPF prog-id=68 op=LOAD Apr 12 18:46:34.241000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:46:34.241000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.246000 audit: BPF prog-id=69 op=LOAD Apr 12 18:46:34.246000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit: BPF prog-id=70 op=LOAD Apr 12 18:46:34.247000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit: BPF prog-id=71 op=LOAD Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.247000 audit: BPF prog-id=72 op=LOAD Apr 12 18:46:34.247000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:46:34.247000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:46:34.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:34.269635 systemd[1]: Started kubelet.service. Apr 12 18:46:34.335173 kubelet[1533]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:46:34.335173 kubelet[1533]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:46:34.335173 kubelet[1533]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:46:34.335739 kubelet[1533]: I0412 18:46:34.335253 1533 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:46:34.794984 kubelet[1533]: I0412 18:46:34.794927 1533 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:46:34.794984 kubelet[1533]: I0412 18:46:34.794969 1533 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:46:34.795390 kubelet[1533]: I0412 18:46:34.795347 1533 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:46:34.798198 kubelet[1533]: I0412 18:46:34.798171 1533 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:46:34.808671 kubelet[1533]: I0412 18:46:34.808614 1533 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:46:34.809001 kubelet[1533]: I0412 18:46:34.808963 1533 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:46:34.809262 kubelet[1533]: I0412 18:46:34.809223 1533 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:46:34.809262 kubelet[1533]: I0412 18:46:34.809258 1533 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:46:34.809526 kubelet[1533]: I0412 18:46:34.809274 1533 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:46:34.809526 kubelet[1533]: I0412 18:46:34.809424 1533 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:46:34.809656 kubelet[1533]: I0412 18:46:34.809566 1533 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:46:34.809656 kubelet[1533]: I0412 18:46:34.809590 1533 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:46:34.809656 kubelet[1533]: I0412 18:46:34.809627 1533 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:46:34.809656 kubelet[1533]: I0412 18:46:34.809655 1533 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:46:34.810225 kubelet[1533]: E0412 18:46:34.810188 1533 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:34.810478 kubelet[1533]: E0412 18:46:34.810449 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:34.810992 kubelet[1533]: I0412 18:46:34.810967 1533 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:46:34.815339 kubelet[1533]: W0412 18:46:34.815296 1533 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:46:34.816202 kubelet[1533]: I0412 18:46:34.816177 1533 server.go:1232] "Started kubelet" Apr 12 18:46:34.817231 kubelet[1533]: I0412 18:46:34.817198 1533 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:46:34.817797 kubelet[1533]: I0412 18:46:34.817774 1533 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:46:34.817974 kubelet[1533]: I0412 18:46:34.817958 1533 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:46:34.817000 audit[1533]: AVC avc: denied { mac_admin } for pid=1533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.817000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:46:34.817000 audit[1533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d47320 a1=c000b2b428 a2=c000d472f0 a3=25 items=0 ppid=1 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.817000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:46:34.817000 audit[1533]: AVC avc: denied { mac_admin } for pid=1533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.817000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:46:34.817000 audit[1533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001edbc0 a1=c000b2b440 a2=c000d473b0 a3=25 items=0 ppid=1 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.817000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:46:34.819388 kubelet[1533]: I0412 18:46:34.818723 1533 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:46:34.819388 kubelet[1533]: I0412 18:46:34.818801 1533 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:46:34.819388 kubelet[1533]: I0412 18:46:34.818895 1533 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:46:34.822699 kubelet[1533]: I0412 18:46:34.822665 1533 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:46:34.829398 kubelet[1533]: E0412 18:46:34.829364 1533 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:46:34.829684 kubelet[1533]: E0412 18:46:34.829663 1533 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:46:34.833964 kubelet[1533]: I0412 18:46:34.833934 1533 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:46:34.836100 kubelet[1533]: I0412 18:46:34.836058 1533 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:46:34.836229 kubelet[1533]: I0412 18:46:34.836182 1533 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:46:34.836474 kubelet[1533]: E0412 18:46:34.836429 1533 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.4\" not found" Apr 12 18:46:34.849492 kubelet[1533]: E0412 18:46:34.849455 1533 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.4\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:46:34.849849 kubelet[1533]: W0412 18:46:34.849826 1533 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:46:34.850015 kubelet[1533]: E0412 18:46:34.849997 1533 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:46:34.850479 kubelet[1533]: W0412 18:46:34.850457 1533 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:46:34.850667 kubelet[1533]: E0412 18:46:34.850636 1533 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:46:34.850862 kubelet[1533]: W0412 18:46:34.850836 1533 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:46:34.850986 kubelet[1533]: E0412 18:46:34.850972 1533 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:46:34.851462 kubelet[1533]: E0412 18:46:34.851313 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30be038e3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 816141539, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 816141539, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.866787 kubelet[1533]: E0412 18:46:34.866662 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30cae34a0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 829640864, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 829640864, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.882639 kubelet[1533]: I0412 18:46:34.882607 1533 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:46:34.882855 kubelet[1533]: I0412 18:46:34.882839 1533 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:46:34.882967 kubelet[1533]: I0412 18:46:34.882952 1533 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:46:34.885943 kubelet[1533]: I0412 18:46:34.885915 1533 policy_none.go:49] "None policy: Start" Apr 12 18:46:34.887877 kubelet[1533]: E0412 18:46:34.887770 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc69c1c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881571868, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881571868, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.888921 kubelet[1533]: I0412 18:46:34.888899 1533 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:46:34.889089 kubelet[1533]: I0412 18:46:34.889076 1533 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:46:34.893583 kubelet[1533]: E0412 18:46:34.893492 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6b8ff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881579263, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881579263, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.896000 audit[1544]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:34.896000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc895196c0 a2=0 a3=7ffc895196ac items=0 ppid=1533 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:46:34.897907 systemd[1]: Created slice kubepods.slice. Apr 12 18:46:34.900000 audit[1550]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:34.900000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffeb083400 a2=0 a3=7fffeb0833ec items=0 ppid=1533 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:46:34.903183 kubelet[1533]: E0412 18:46:34.903089 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6cd9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881584539, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881584539, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.922846 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:46:34.927933 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:46:34.903000 audit[1552]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:34.903000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2b075670 a2=0 a3=7ffe2b07565c items=0 ppid=1533 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:46:34.933982 kubelet[1533]: I0412 18:46:34.933958 1533 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:46:34.933000 audit[1533]: AVC avc: denied { mac_admin } for pid=1533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:34.933000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:46:34.933000 audit[1533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b67470 a1=c000ba8270 a2=c000b67440 a3=25 items=0 ppid=1 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.933000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:46:34.934526 kubelet[1533]: I0412 18:46:34.934504 1533 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:46:34.934878 kubelet[1533]: I0412 18:46:34.934860 1533 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:46:34.939561 kubelet[1533]: E0412 18:46:34.939111 1533 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.4\" not found" Apr 12 18:46:34.939561 kubelet[1533]: I0412 18:46:34.939283 1533 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.4" Apr 12 18:46:34.940314 kubelet[1533]: E0412 18:46:34.940202 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc3131edd1a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 937687322, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 937687322, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.941000 audit[1559]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:34.941000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff8aa9ac0 a2=0 a3=7ffff8aa9aac items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:34.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:46:34.949331 kubelet[1533]: E0412 18:46:34.949279 1533 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.4" Apr 12 18:46:34.949526 kubelet[1533]: E0412 18:46:34.949416 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc69c1c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881571868, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 939218515, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc69c1c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.959936 kubelet[1533]: E0412 18:46:34.959811 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6b8ff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881579263, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 939224840, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6b8ff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:34.961800 kubelet[1533]: E0412 18:46:34.961714 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6cd9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881584539, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 939228350, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6cd9b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.000000 audit[1564]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:35.000000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe3e6dfc20 a2=0 a3=7ffe3e6dfc0c items=0 ppid=1533 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:46:35.002539 kubelet[1533]: I0412 18:46:35.002507 1533 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:46:35.003000 audit[1565]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1565 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:35.003000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc538cbb20 a2=0 a3=7ffc538cbb0c items=0 ppid=1533 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:46:35.003000 audit[1566]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:35.003000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe19b9a940 a2=0 a3=7ffe19b9a92c items=0 ppid=1533 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:46:35.005411 kubelet[1533]: I0412 18:46:35.005385 1533 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:46:35.005561 kubelet[1533]: I0412 18:46:35.005544 1533 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:46:35.005707 kubelet[1533]: I0412 18:46:35.005690 1533 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:46:35.005895 kubelet[1533]: E0412 18:46:35.005877 1533 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:46:35.006000 audit[1567]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:35.006000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe5b109570 a2=0 a3=7ffe5b10955c items=0 ppid=1533 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:46:35.008580 kubelet[1533]: W0412 18:46:35.008550 1533 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:46:35.008685 kubelet[1533]: E0412 18:46:35.008590 1533 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:46:35.008000 audit[1569]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:35.008000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2aa3ebc0 a2=0 a3=7ffc2aa3ebac items=0 ppid=1533 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.009000 audit[1568]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:35.009000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc211ec20 a2=0 a3=10e3 items=0 ppid=1533 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:46:35.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:46:35.010000 audit[1570]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:35.010000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd1e3ea470 a2=0 a3=7ffd1e3ea45c items=0 ppid=1533 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:46:35.012000 audit[1571]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:35.012000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd76c4620 a2=0 a3=7fffd76c460c items=0 ppid=1533 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:46:35.052330 kubelet[1533]: E0412 18:46:35.052161 1533 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.4\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:46:35.150905 kubelet[1533]: I0412 18:46:35.150864 1533 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.4" Apr 12 18:46:35.152292 kubelet[1533]: E0412 18:46:35.152230 1533 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.4" Apr 12 18:46:35.152814 kubelet[1533]: E0412 18:46:35.152713 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc69c1c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881571868, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 150767900, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc69c1c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.153817 kubelet[1533]: E0412 18:46:35.153732 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6b8ff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881579263, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 150777352, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6b8ff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.154818 kubelet[1533]: E0412 18:46:35.154728 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6cd9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881584539, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 150784366, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6cd9b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.453729 kubelet[1533]: E0412 18:46:35.453607 1533 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.4\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:46:35.554062 kubelet[1533]: I0412 18:46:35.554005 1533 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.4" Apr 12 18:46:35.555490 kubelet[1533]: E0412 18:46:35.555431 1533 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.4" Apr 12 18:46:35.555639 kubelet[1533]: E0412 18:46:35.555461 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc69c1c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881571868, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 553951745, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc69c1c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.556622 kubelet[1533]: E0412 18:46:35.556543 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6b8ff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881579263, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 553959858, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6b8ff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.557596 kubelet[1533]: E0412 18:46:35.557499 1533 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4.17c59cc30fc6cd9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.4", UID:"10.128.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.4"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 46, 34, 881584539, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 46, 35, 553964076, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.4"}': 'events "10.128.0.4.17c59cc30fc6cd9b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:46:35.798200 kubelet[1533]: I0412 18:46:35.797914 1533 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:46:35.811333 kubelet[1533]: E0412 18:46:35.811281 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:36.207282 kubelet[1533]: E0412 18:46:36.207137 1533 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.128.0.4" not found Apr 12 18:46:36.260043 kubelet[1533]: E0412 18:46:36.259981 1533 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.4\" not found" node="10.128.0.4" Apr 12 18:46:36.357342 kubelet[1533]: I0412 18:46:36.357258 1533 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.4" Apr 12 18:46:36.362870 kubelet[1533]: I0412 18:46:36.362797 1533 kubelet_node_status.go:73] "Successfully registered node" node="10.128.0.4" Apr 12 18:46:36.401729 kubelet[1533]: E0412 18:46:36.401675 1533 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.4\" not found" Apr 12 18:46:36.503661 kubelet[1533]: I0412 18:46:36.503229 1533 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:46:36.504891 env[1149]: time="2024-04-12T18:46:36.504748835Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:46:36.505417 kubelet[1533]: I0412 18:46:36.505077 1533 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:46:36.789000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.790307 sudo[1351]: pam_unix(sudo:session): session closed for user root Apr 12 18:46:36.795995 kernel: kauditd_printk_skb: 478 callbacks suppressed Apr 12 18:46:36.796093 kernel: audit: type=1106 audit(1712947596.789:618): pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.811326 kubelet[1533]: I0412 18:46:36.811290 1533 apiserver.go:52] "Watching apiserver" Apr 12 18:46:36.811622 kubelet[1533]: E0412 18:46:36.811590 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:36.789000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.836491 kubelet[1533]: I0412 18:46:36.836456 1533 topology_manager.go:215] "Topology Admit Handler" podUID="8207ff1e-e5ca-4e08-aecf-e2384072e9b0" podNamespace="calico-system" podName="calico-node-bks82" Apr 12 18:46:36.836867 kubelet[1533]: I0412 18:46:36.836849 1533 topology_manager.go:215] "Topology Admit Handler" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" podNamespace="calico-system" podName="csi-node-driver-lgcz9" Apr 12 18:46:36.837140 kubelet[1533]: I0412 18:46:36.837093 1533 topology_manager.go:215] "Topology Admit Handler" podUID="7524b114-6746-489c-aab4-b2bef37be7bc" podNamespace="kube-system" podName="kube-proxy-mjkml" Apr 12 18:46:36.838431 kubelet[1533]: E0412 18:46:36.838409 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:36.844292 kernel: audit: type=1104 audit(1712947596.789:619): pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.845011 sshd[1348]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:36.847000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:36.852286 systemd[1]: sshd@6-10.128.0.4:22-139.178.89.65:58378.service: Deactivated successfully. Apr 12 18:46:36.853452 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:46:36.857701 systemd-logind[1131]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:46:36.860308 systemd[1]: Created slice kubepods-besteffort-pod7524b114_6746_489c_aab4_b2bef37be7bc.slice. Apr 12 18:46:36.863622 systemd-logind[1131]: Removed session 7. Apr 12 18:46:36.847000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:36.906250 kernel: audit: type=1106 audit(1712947596.847:620): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:36.906396 kernel: audit: type=1104 audit(1712947596.847:621): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:36.906438 kernel: audit: type=1131 audit(1712947596.848:622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.4:22-139.178.89.65:58378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.4:22-139.178.89.65:58378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.935482 systemd[1]: Created slice kubepods-besteffort-pod8207ff1e_e5ca_4e08_aecf_e2384072e9b0.slice. Apr 12 18:46:36.937393 kubelet[1533]: I0412 18:46:36.937360 1533 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:46:36.944531 kubelet[1533]: I0412 18:46:36.944505 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b6b6983f-32b2-47cf-9d27-0eda23916877-varrun\") pod \"csi-node-driver-lgcz9\" (UID: \"b6b6983f-32b2-47cf-9d27-0eda23916877\") " pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:36.944693 kubelet[1533]: I0412 18:46:36.944679 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b6b6983f-32b2-47cf-9d27-0eda23916877-registration-dir\") pod \"csi-node-driver-lgcz9\" (UID: \"b6b6983f-32b2-47cf-9d27-0eda23916877\") " pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:36.944780 kubelet[1533]: I0412 18:46:36.944770 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-lib-modules\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.944860 kubelet[1533]: I0412 18:46:36.944850 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-tigera-ca-bundle\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.944996 kubelet[1533]: I0412 18:46:36.944981 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-cni-bin-dir\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945126 kubelet[1533]: I0412 18:46:36.945104 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-cni-log-dir\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945195 kubelet[1533]: I0412 18:46:36.945152 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bvbsh\" (UniqueName: \"kubernetes.io/projected/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-kube-api-access-bvbsh\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945195 kubelet[1533]: I0412 18:46:36.945189 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7524b114-6746-489c-aab4-b2bef37be7bc-kube-proxy\") pod \"kube-proxy-mjkml\" (UID: \"7524b114-6746-489c-aab4-b2bef37be7bc\") " pod="kube-system/kube-proxy-mjkml" Apr 12 18:46:36.945334 kubelet[1533]: I0412 18:46:36.945222 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7524b114-6746-489c-aab4-b2bef37be7bc-xtables-lock\") pod \"kube-proxy-mjkml\" (UID: \"7524b114-6746-489c-aab4-b2bef37be7bc\") " pod="kube-system/kube-proxy-mjkml" Apr 12 18:46:36.945334 kubelet[1533]: I0412 18:46:36.945260 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gvbss\" (UniqueName: \"kubernetes.io/projected/7524b114-6746-489c-aab4-b2bef37be7bc-kube-api-access-gvbss\") pod \"kube-proxy-mjkml\" (UID: \"7524b114-6746-489c-aab4-b2bef37be7bc\") " pod="kube-system/kube-proxy-mjkml" Apr 12 18:46:36.945334 kubelet[1533]: I0412 18:46:36.945326 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-var-lib-calico\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945483 kubelet[1533]: I0412 18:46:36.945362 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-cni-net-dir\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945483 kubelet[1533]: I0412 18:46:36.945400 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-flexvol-driver-host\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945483 kubelet[1533]: I0412 18:46:36.945437 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b6b6983f-32b2-47cf-9d27-0eda23916877-kubelet-dir\") pod \"csi-node-driver-lgcz9\" (UID: \"b6b6983f-32b2-47cf-9d27-0eda23916877\") " pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:36.945483 kubelet[1533]: I0412 18:46:36.945477 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ls5x\" (UniqueName: \"kubernetes.io/projected/b6b6983f-32b2-47cf-9d27-0eda23916877-kube-api-access-2ls5x\") pod \"csi-node-driver-lgcz9\" (UID: \"b6b6983f-32b2-47cf-9d27-0eda23916877\") " pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:36.945685 kubelet[1533]: I0412 18:46:36.945512 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-policysync\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945685 kubelet[1533]: I0412 18:46:36.945555 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-xtables-lock\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945685 kubelet[1533]: I0412 18:46:36.945612 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-node-certs\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945685 kubelet[1533]: I0412 18:46:36.945651 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8207ff1e-e5ca-4e08-aecf-e2384072e9b0-var-run-calico\") pod \"calico-node-bks82\" (UID: \"8207ff1e-e5ca-4e08-aecf-e2384072e9b0\") " pod="calico-system/calico-node-bks82" Apr 12 18:46:36.945897 kubelet[1533]: I0412 18:46:36.945688 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b6b6983f-32b2-47cf-9d27-0eda23916877-socket-dir\") pod \"csi-node-driver-lgcz9\" (UID: \"b6b6983f-32b2-47cf-9d27-0eda23916877\") " pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:36.945897 kubelet[1533]: I0412 18:46:36.945722 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7524b114-6746-489c-aab4-b2bef37be7bc-lib-modules\") pod \"kube-proxy-mjkml\" (UID: \"7524b114-6746-489c-aab4-b2bef37be7bc\") " pod="kube-system/kube-proxy-mjkml" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049096 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052082 kubelet[1533]: W0412 18:46:37.049123 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049172 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049507 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052082 kubelet[1533]: W0412 18:46:37.049522 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049544 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049823 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052082 kubelet[1533]: W0412 18:46:37.049835 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.049854 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052082 kubelet[1533]: E0412 18:46:37.050129 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052749 kubelet[1533]: W0412 18:46:37.050142 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050160 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050401 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052749 kubelet[1533]: W0412 18:46:37.050412 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050430 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050707 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052749 kubelet[1533]: W0412 18:46:37.050719 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050738 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.052749 kubelet[1533]: E0412 18:46:37.050991 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.052749 kubelet[1533]: W0412 18:46:37.051001 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051019 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051288 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053280 kubelet[1533]: W0412 18:46:37.051299 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051316 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051600 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053280 kubelet[1533]: W0412 18:46:37.051613 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051630 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051947 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053280 kubelet[1533]: W0412 18:46:37.051959 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053280 kubelet[1533]: E0412 18:46:37.051976 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052270 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053766 kubelet[1533]: W0412 18:46:37.052282 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052303 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052561 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053766 kubelet[1533]: W0412 18:46:37.052573 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052591 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052827 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.053766 kubelet[1533]: W0412 18:46:37.052838 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.052860 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.053766 kubelet[1533]: E0412 18:46:37.053165 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.054333 kubelet[1533]: W0412 18:46:37.053177 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.054333 kubelet[1533]: E0412 18:46:37.053196 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.054897 kubelet[1533]: E0412 18:46:37.054876 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.055080 kubelet[1533]: W0412 18:46:37.055061 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.055246 kubelet[1533]: E0412 18:46:37.055227 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.056590 kubelet[1533]: E0412 18:46:37.056570 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.056733 kubelet[1533]: W0412 18:46:37.056713 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.056868 kubelet[1533]: E0412 18:46:37.056852 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.074017 kubelet[1533]: E0412 18:46:37.073987 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.074283 kubelet[1533]: W0412 18:46:37.074259 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.074504 kubelet[1533]: E0412 18:46:37.074484 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.074961 kubelet[1533]: E0412 18:46:37.074939 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.075170 kubelet[1533]: W0412 18:46:37.075148 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.075434 kubelet[1533]: E0412 18:46:37.075414 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.084053 kubelet[1533]: E0412 18:46:37.083764 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.084053 kubelet[1533]: W0412 18:46:37.083787 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.084053 kubelet[1533]: E0412 18:46:37.083931 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.084330 kubelet[1533]: E0412 18:46:37.084310 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.084330 kubelet[1533]: W0412 18:46:37.084328 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.084925 kubelet[1533]: E0412 18:46:37.084463 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.084925 kubelet[1533]: E0412 18:46:37.084788 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.084925 kubelet[1533]: W0412 18:46:37.084803 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.085201 kubelet[1533]: E0412 18:46:37.084956 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.085261 kubelet[1533]: E0412 18:46:37.085203 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.085261 kubelet[1533]: W0412 18:46:37.085215 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.085372 kubelet[1533]: E0412 18:46:37.085329 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.085538 kubelet[1533]: E0412 18:46:37.085517 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.085538 kubelet[1533]: W0412 18:46:37.085538 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.085777 kubelet[1533]: E0412 18:46:37.085757 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.085905 kubelet[1533]: E0412 18:46:37.085888 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.086000 kubelet[1533]: W0412 18:46:37.085905 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.086200 kubelet[1533]: E0412 18:46:37.086180 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.086200 kubelet[1533]: W0412 18:46:37.086199 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.086484 kubelet[1533]: E0412 18:46:37.086464 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.086484 kubelet[1533]: W0412 18:46:37.086484 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.086772 kubelet[1533]: E0412 18:46:37.086752 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.086772 kubelet[1533]: W0412 18:46:37.086772 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.087085 kubelet[1533]: E0412 18:46:37.087019 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.087085 kubelet[1533]: W0412 18:46:37.087085 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.087292 kubelet[1533]: E0412 18:46:37.087273 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087490 kubelet[1533]: E0412 18:46:37.087334 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.087570 kubelet[1533]: W0412 18:46:37.087497 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.087628 kubelet[1533]: E0412 18:46:37.087349 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087628 kubelet[1533]: E0412 18:46:37.087361 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087628 kubelet[1533]: E0412 18:46:37.087071 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087776 kubelet[1533]: E0412 18:46:37.087371 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087776 kubelet[1533]: E0412 18:46:37.087663 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.087887 kubelet[1533]: E0412 18:46:37.087849 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.087887 kubelet[1533]: W0412 18:46:37.087861 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.088003 kubelet[1533]: E0412 18:46:37.087986 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.088265 kubelet[1533]: E0412 18:46:37.088217 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.088265 kubelet[1533]: W0412 18:46:37.088238 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.088265 kubelet[1533]: E0412 18:46:37.088262 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.088691 kubelet[1533]: E0412 18:46:37.088670 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.088771 kubelet[1533]: W0412 18:46:37.088695 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.088771 kubelet[1533]: E0412 18:46:37.088720 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.089132 kubelet[1533]: E0412 18:46:37.089111 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.089132 kubelet[1533]: W0412 18:46:37.089129 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.089348 kubelet[1533]: E0412 18:46:37.089308 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.089815 kubelet[1533]: E0412 18:46:37.089797 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.089815 kubelet[1533]: W0412 18:46:37.089812 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.090017 kubelet[1533]: E0412 18:46:37.089995 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.090273 kubelet[1533]: E0412 18:46:37.090255 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.090273 kubelet[1533]: W0412 18:46:37.090272 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.090484 kubelet[1533]: E0412 18:46:37.090437 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.090685 kubelet[1533]: E0412 18:46:37.090666 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.090685 kubelet[1533]: W0412 18:46:37.090682 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.090878 kubelet[1533]: E0412 18:46:37.090856 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.091134 kubelet[1533]: E0412 18:46:37.091115 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.091134 kubelet[1533]: W0412 18:46:37.091131 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.091315 kubelet[1533]: E0412 18:46:37.091294 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.091573 kubelet[1533]: E0412 18:46:37.091555 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.091573 kubelet[1533]: W0412 18:46:37.091571 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.091747 kubelet[1533]: E0412 18:46:37.091726 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.092005 kubelet[1533]: E0412 18:46:37.091986 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.092005 kubelet[1533]: W0412 18:46:37.092002 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.092177 kubelet[1533]: E0412 18:46:37.092059 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.092441 kubelet[1533]: E0412 18:46:37.092422 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.092441 kubelet[1533]: W0412 18:46:37.092439 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.092610 kubelet[1533]: E0412 18:46:37.092590 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.092866 kubelet[1533]: E0412 18:46:37.092847 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.092866 kubelet[1533]: W0412 18:46:37.092863 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.093074 kubelet[1533]: E0412 18:46:37.092882 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.106885 kubelet[1533]: E0412 18:46:37.106854 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:37.106885 kubelet[1533]: W0412 18:46:37.106877 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:37.107110 kubelet[1533]: E0412 18:46:37.106906 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:37.239342 env[1149]: time="2024-04-12T18:46:37.239273870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mjkml,Uid:7524b114-6746-489c-aab4-b2bef37be7bc,Namespace:kube-system,Attempt:0,}" Apr 12 18:46:37.241519 env[1149]: time="2024-04-12T18:46:37.241448957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bks82,Uid:8207ff1e-e5ca-4e08-aecf-e2384072e9b0,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:37.757066 env[1149]: time="2024-04-12T18:46:37.756990127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.758384 env[1149]: time="2024-04-12T18:46:37.758337470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.764037 env[1149]: time="2024-04-12T18:46:37.763973697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.765225 env[1149]: time="2024-04-12T18:46:37.765175620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.766118 env[1149]: time="2024-04-12T18:46:37.766083011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.768499 env[1149]: time="2024-04-12T18:46:37.768447728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.769440 env[1149]: time="2024-04-12T18:46:37.769403486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.773211 env[1149]: time="2024-04-12T18:46:37.773172507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:37.804569 env[1149]: time="2024-04-12T18:46:37.798455869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:37.804569 env[1149]: time="2024-04-12T18:46:37.798518915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:37.804569 env[1149]: time="2024-04-12T18:46:37.798537867Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:37.804569 env[1149]: time="2024-04-12T18:46:37.798718337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/286c40f816e25f7641182a39f59d060ed68f6fb73261fd4fe20b3d848e58c29d pid=1631 runtime=io.containerd.runc.v2 Apr 12 18:46:37.805863 env[1149]: time="2024-04-12T18:46:37.801494289Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:37.805863 env[1149]: time="2024-04-12T18:46:37.801544750Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:37.805863 env[1149]: time="2024-04-12T18:46:37.801563600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:37.805863 env[1149]: time="2024-04-12T18:46:37.801739651Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27 pid=1640 runtime=io.containerd.runc.v2 Apr 12 18:46:37.812007 kubelet[1533]: E0412 18:46:37.811937 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:37.831453 systemd[1]: Started cri-containerd-286c40f816e25f7641182a39f59d060ed68f6fb73261fd4fe20b3d848e58c29d.scope. Apr 12 18:46:37.834556 systemd[1]: Started cri-containerd-a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27.scope. Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.911152 kernel: audit: type=1400 audit(1712947597.868:623): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.911319 kernel: audit: type=1400 audit(1712947597.868:624): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931833 kernel: audit: type=1400 audit(1712947597.868:625): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.944615 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:46:37.944751 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit: BPF prog-id=73 op=LOAD Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.930000 audit: BPF prog-id=74 op=LOAD Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1631 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366334306638313665323566373634313138326133396635396430 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1631 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366334306638313665323566373634313138326133396635396430 Apr 12 18:46:37.931000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130396466643564303362663162373161313362363836376132613062 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130396466643564303362663162373161313362363836376132613062 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit: BPF prog-id=75 op=LOAD Apr 12 18:46:37.931000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002bb0b0 items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: BPF prog-id=76 op=LOAD Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130396466643564303362663162373161313362363836376132613062 Apr 12 18:46:37.931000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024850 items=0 ppid=1631 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366334306638313665323566373634313138326133396635396430 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.931000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002bb0f8 items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130396466643564303362663162373161313362363836376132613062 Apr 12 18:46:37.945000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:46:37.945000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:46:37.945000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:37.945000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002bb508 items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130396466643564303362663162373161313362363836376132613062 Apr 12 18:46:37.976105 env[1149]: time="2024-04-12T18:46:37.976042703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mjkml,Uid:7524b114-6746-489c-aab4-b2bef37be7bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"286c40f816e25f7641182a39f59d060ed68f6fb73261fd4fe20b3d848e58c29d\"" Apr 12 18:46:37.980639 env[1149]: time="2024-04-12T18:46:37.980585786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bks82,Uid:8207ff1e-e5ca-4e08-aecf-e2384072e9b0,Namespace:calico-system,Attempt:0,} returns sandbox id \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\"" Apr 12 18:46:37.985320 kubelet[1533]: E0412 18:46:37.985268 1533 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Apr 12 18:46:37.986255 env[1149]: time="2024-04-12T18:46:37.986201168Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:46:38.065560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3502249240.mount: Deactivated successfully. Apr 12 18:46:38.812456 kubelet[1533]: E0412 18:46:38.812387 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:39.008281 kubelet[1533]: E0412 18:46:39.007692 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:39.177525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount221857854.mount: Deactivated successfully. Apr 12 18:46:39.813648 kubelet[1533]: E0412 18:46:39.813569 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:39.851803 env[1149]: time="2024-04-12T18:46:39.851705245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:39.855081 env[1149]: time="2024-04-12T18:46:39.855014810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:39.857418 env[1149]: time="2024-04-12T18:46:39.857355393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:39.859784 env[1149]: time="2024-04-12T18:46:39.859720334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:39.860664 env[1149]: time="2024-04-12T18:46:39.860619205Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 18:46:39.862594 env[1149]: time="2024-04-12T18:46:39.862540740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:46:39.864387 env[1149]: time="2024-04-12T18:46:39.864324295Z" level=info msg="CreateContainer within sandbox \"286c40f816e25f7641182a39f59d060ed68f6fb73261fd4fe20b3d848e58c29d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:46:39.882512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1257390776.mount: Deactivated successfully. Apr 12 18:46:39.893340 env[1149]: time="2024-04-12T18:46:39.893279170Z" level=info msg="CreateContainer within sandbox \"286c40f816e25f7641182a39f59d060ed68f6fb73261fd4fe20b3d848e58c29d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"69e6fdaead6e115f1b809da8893c35d9506e1539230e3159cdd3a2f33ea45814\"" Apr 12 18:46:39.894491 env[1149]: time="2024-04-12T18:46:39.894447956Z" level=info msg="StartContainer for \"69e6fdaead6e115f1b809da8893c35d9506e1539230e3159cdd3a2f33ea45814\"" Apr 12 18:46:39.923314 systemd[1]: Started cri-containerd-69e6fdaead6e115f1b809da8893c35d9506e1539230e3159cdd3a2f33ea45814.scope. Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f81b2102018 items=0 ppid=1631 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639653666646165616436653131356631623830396461383839336333 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.946000 audit: BPF prog-id=81 op=LOAD Apr 12 18:46:39.946000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000382bc8 items=0 ppid=1631 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639653666646165616436653131356631623830396461383839336333 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit: BPF prog-id=82 op=LOAD Apr 12 18:46:39.947000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000382c18 items=0 ppid=1631 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639653666646165616436653131356631623830396461383839336333 Apr 12 18:46:39.947000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:46:39.947000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.947000 audit: BPF prog-id=83 op=LOAD Apr 12 18:46:39.947000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000382ca8 items=0 ppid=1631 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639653666646165616436653131356631623830396461383839336333 Apr 12 18:46:39.973920 env[1149]: time="2024-04-12T18:46:39.973863037Z" level=info msg="StartContainer for \"69e6fdaead6e115f1b809da8893c35d9506e1539230e3159cdd3a2f33ea45814\" returns successfully" Apr 12 18:46:40.048365 kubelet[1533]: I0412 18:46:40.048329 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mjkml" podStartSLOduration=2.168840883 podCreationTimestamp="2024-04-12 18:46:36 +0000 UTC" firstStartedPulling="2024-04-12 18:46:37.981925635 +0000 UTC m=+3.706468101" lastFinishedPulling="2024-04-12 18:46:39.861357226 +0000 UTC m=+5.585899701" observedRunningTime="2024-04-12 18:46:40.048223461 +0000 UTC m=+5.772765945" watchObservedRunningTime="2024-04-12 18:46:40.048272483 +0000 UTC m=+5.772814960" Apr 12 18:46:40.059466 kubelet[1533]: E0412 18:46:40.059439 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.059646 kubelet[1533]: W0412 18:46:40.059627 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.059734 kubelet[1533]: E0412 18:46:40.059722 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.060313 kubelet[1533]: E0412 18:46:40.060290 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.060499 kubelet[1533]: W0412 18:46:40.060476 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.060632 kubelet[1533]: E0412 18:46:40.060617 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.061104 kubelet[1533]: E0412 18:46:40.061085 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.061253 kubelet[1533]: W0412 18:46:40.061233 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.061369 kubelet[1533]: E0412 18:46:40.061355 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.061817 kubelet[1533]: E0412 18:46:40.061799 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.061953 kubelet[1533]: W0412 18:46:40.061936 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.062107 kubelet[1533]: E0412 18:46:40.062090 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.062652 kubelet[1533]: E0412 18:46:40.062634 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.062787 kubelet[1533]: W0412 18:46:40.062767 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.062913 kubelet[1533]: E0412 18:46:40.062897 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.063374 kubelet[1533]: E0412 18:46:40.063356 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.063524 kubelet[1533]: W0412 18:46:40.063505 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.063638 kubelet[1533]: E0412 18:46:40.063623 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.065092 kubelet[1533]: E0412 18:46:40.064083 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.065240 kubelet[1533]: W0412 18:46:40.065217 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.065348 kubelet[1533]: E0412 18:46:40.065335 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.067794 kubelet[1533]: E0412 18:46:40.067774 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.068055 kubelet[1533]: W0412 18:46:40.068007 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.068248 kubelet[1533]: E0412 18:46:40.068229 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.069303 kubelet[1533]: E0412 18:46:40.069284 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.069464 kubelet[1533]: W0412 18:46:40.069443 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.069616 kubelet[1533]: E0412 18:46:40.069598 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.070265 kubelet[1533]: E0412 18:46:40.070236 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.070429 kubelet[1533]: W0412 18:46:40.070405 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.070621 kubelet[1533]: E0412 18:46:40.070602 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.071497 kubelet[1533]: E0412 18:46:40.071157 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.071497 kubelet[1533]: W0412 18:46:40.071177 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.071497 kubelet[1533]: E0412 18:46:40.071198 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.071497 kubelet[1533]: E0412 18:46:40.071491 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.071497 kubelet[1533]: W0412 18:46:40.071503 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.071497 kubelet[1533]: E0412 18:46:40.071522 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.072082 kubelet[1533]: E0412 18:46:40.071817 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.072082 kubelet[1533]: W0412 18:46:40.071830 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.072082 kubelet[1533]: E0412 18:46:40.071849 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.072472 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.073450 kubelet[1533]: W0412 18:46:40.072489 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.072509 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.072768 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.073450 kubelet[1533]: W0412 18:46:40.072808 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.072826 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.073133 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.073450 kubelet[1533]: W0412 18:46:40.073146 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.073450 kubelet[1533]: E0412 18:46:40.073166 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.074120 kubelet[1533]: E0412 18:46:40.073499 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.074120 kubelet[1533]: W0412 18:46:40.073512 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.074120 kubelet[1533]: E0412 18:46:40.073530 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.074120 kubelet[1533]: E0412 18:46:40.073781 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.074120 kubelet[1533]: W0412 18:46:40.073793 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.074120 kubelet[1533]: E0412 18:46:40.073812 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.074464 kubelet[1533]: E0412 18:46:40.074239 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.074464 kubelet[1533]: W0412 18:46:40.074252 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.074464 kubelet[1533]: E0412 18:46:40.074272 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.075488 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.077654 kubelet[1533]: W0412 18:46:40.075504 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.075527 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.075944 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.077654 kubelet[1533]: W0412 18:46:40.075957 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.075976 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.076347 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.077654 kubelet[1533]: W0412 18:46:40.076362 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.076386 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.077654 kubelet[1533]: E0412 18:46:40.076699 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078267 kubelet[1533]: W0412 18:46:40.076711 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.076733 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.077015 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078267 kubelet[1533]: W0412 18:46:40.077037 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.077061 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.077332 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078267 kubelet[1533]: W0412 18:46:40.077344 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.077370 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.078267 kubelet[1533]: E0412 18:46:40.077688 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078267 kubelet[1533]: W0412 18:46:40.077701 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078798 kubelet[1533]: E0412 18:46:40.077819 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.078798 kubelet[1533]: E0412 18:46:40.078328 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078798 kubelet[1533]: W0412 18:46:40.078341 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078798 kubelet[1533]: E0412 18:46:40.078366 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.078798 kubelet[1533]: E0412 18:46:40.078665 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.078798 kubelet[1533]: W0412 18:46:40.078677 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.078798 kubelet[1533]: E0412 18:46:40.078699 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.079193 kubelet[1533]: E0412 18:46:40.078974 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.079193 kubelet[1533]: W0412 18:46:40.078985 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.079193 kubelet[1533]: E0412 18:46:40.079008 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.079367 kubelet[1533]: E0412 18:46:40.079341 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.079367 kubelet[1533]: W0412 18:46:40.079353 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.079563 kubelet[1533]: E0412 18:46:40.079472 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.081867 kubelet[1533]: E0412 18:46:40.080054 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.081867 kubelet[1533]: W0412 18:46:40.080070 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.081867 kubelet[1533]: E0412 18:46:40.080095 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.081867 kubelet[1533]: E0412 18:46:40.080363 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:40.081867 kubelet[1533]: W0412 18:46:40.080374 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:40.081867 kubelet[1533]: E0412 18:46:40.080391 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:40.083000 audit[1803]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.083000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff55193520 a2=0 a3=7fff5519350c items=0 ppid=1729 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:46:40.087000 audit[1804]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.087000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeff4ac7d0 a2=0 a3=7ffeff4ac7bc items=0 ppid=1729 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:46:40.090000 audit[1805]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.090000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd73c7e800 a2=0 a3=7ffd73c7e7ec items=0 ppid=1729 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:46:40.092000 audit[1806]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.092000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4bff5280 a2=0 a3=7ffe4bff526c items=0 ppid=1729 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:46:40.094000 audit[1807]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.094000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe801583d0 a2=0 a3=7ffe801583bc items=0 ppid=1729 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:46:40.095000 audit[1808]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.095000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5d41e400 a2=0 a3=7ffd5d41e3ec items=0 ppid=1729 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:46:40.185000 audit[1809]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.185000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc28005f40 a2=0 a3=7ffc28005f2c items=0 ppid=1729 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:46:40.190000 audit[1811]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.190000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff3806b750 a2=0 a3=7fff3806b73c items=0 ppid=1729 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:46:40.195000 audit[1814]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.195000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffceaf8d400 a2=0 a3=7ffceaf8d3ec items=0 ppid=1729 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:46:40.197000 audit[1815]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.197000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff314d7f60 a2=0 a3=7fff314d7f4c items=0 ppid=1729 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:46:40.201000 audit[1817]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.201000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff56b95680 a2=0 a3=7fff56b9566c items=0 ppid=1729 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:46:40.202000 audit[1818]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.202000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe01da2e50 a2=0 a3=7ffe01da2e3c items=0 ppid=1729 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:46:40.206000 audit[1820]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.206000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffad1cc810 a2=0 a3=7fffad1cc7fc items=0 ppid=1729 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:46:40.212000 audit[1823]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.212000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff4871280 a2=0 a3=7ffff487126c items=0 ppid=1729 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:46:40.214000 audit[1824]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.214000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0dcc3ef0 a2=0 a3=7ffe0dcc3edc items=0 ppid=1729 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:46:40.218000 audit[1826]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.218000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffacd6630 a2=0 a3=7ffffacd661c items=0 ppid=1729 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:46:40.220000 audit[1827]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.220000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd300840d0 a2=0 a3=7ffd300840bc items=0 ppid=1729 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:46:40.223000 audit[1829]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.223000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2bc7c2f0 a2=0 a3=7ffd2bc7c2dc items=0 ppid=1729 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:46:40.231000 audit[1832]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.231000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7fd3fff0 a2=0 a3=7ffd7fd3ffdc items=0 ppid=1729 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:46:40.237000 audit[1835]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.237000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc10ec9da0 a2=0 a3=7ffc10ec9d8c items=0 ppid=1729 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:46:40.239000 audit[1836]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.239000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd87e07940 a2=0 a3=7ffd87e0792c items=0 ppid=1729 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:46:40.243000 audit[1838]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.243000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc54d98f90 a2=0 a3=7ffc54d98f7c items=0 ppid=1729 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:46:40.274000 audit[1843]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.274000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffefc0c2ce0 a2=0 a3=7ffefc0c2ccc items=0 ppid=1729 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:46:40.276000 audit[1844]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.276000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda8589590 a2=0 a3=7ffda858957c items=0 ppid=1729 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:46:40.280000 audit[1846]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:46:40.280000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc60021b10 a2=0 a3=7ffc60021afc items=0 ppid=1729 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:46:40.308000 audit[1852]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.308000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd89af6fb0 a2=0 a3=7ffd89af6f9c items=0 ppid=1729 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.333000 audit[1852]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.333000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd89af6fb0 a2=0 a3=7ffd89af6f9c items=0 ppid=1729 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.336000 audit[1858]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.336000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff9f30dc10 a2=0 a3=7fff9f30dbfc items=0 ppid=1729 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:46:40.345000 audit[1860]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.345000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8d357bf0 a2=0 a3=7fff8d357bdc items=0 ppid=1729 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:46:40.352000 audit[1863]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.352000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc8ec6310 a2=0 a3=7fffc8ec62fc items=0 ppid=1729 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:46:40.354000 audit[1864]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.354000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3cff22d0 a2=0 a3=7ffe3cff22bc items=0 ppid=1729 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:46:40.358000 audit[1866]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.358000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc537cc360 a2=0 a3=7ffc537cc34c items=0 ppid=1729 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:46:40.360000 audit[1867]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.360000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1c22eae0 a2=0 a3=7fff1c22eacc items=0 ppid=1729 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:46:40.364000 audit[1869]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.364000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde1b578e0 a2=0 a3=7ffde1b578cc items=0 ppid=1729 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:46:40.370000 audit[1872]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.370000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc077acb60 a2=0 a3=7ffc077acb4c items=0 ppid=1729 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:46:40.372000 audit[1873]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.372000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5dc4dde0 a2=0 a3=7fff5dc4ddcc items=0 ppid=1729 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:46:40.375000 audit[1875]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.375000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3a403310 a2=0 a3=7ffe3a4032fc items=0 ppid=1729 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:46:40.377000 audit[1876]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.377000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4dcfb340 a2=0 a3=7ffd4dcfb32c items=0 ppid=1729 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:46:40.381000 audit[1878]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.381000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3cfb9c00 a2=0 a3=7ffd3cfb9bec items=0 ppid=1729 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:46:40.386000 audit[1881]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.386000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc76cef480 a2=0 a3=7ffc76cef46c items=0 ppid=1729 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:46:40.392000 audit[1884]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.392000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef23a3730 a2=0 a3=7ffef23a371c items=0 ppid=1729 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:46:40.393000 audit[1885]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.393000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8bc80660 a2=0 a3=7fff8bc8064c items=0 ppid=1729 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:46:40.397000 audit[1887]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.397000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf428f7c0 a2=0 a3=7ffcf428f7ac items=0 ppid=1729 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:46:40.404000 audit[1890]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.404000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffff35cf5a0 a2=0 a3=7ffff35cf58c items=0 ppid=1729 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:46:40.406000 audit[1891]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.406000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd244e7530 a2=0 a3=7ffd244e751c items=0 ppid=1729 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:46:40.410000 audit[1893]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.410000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfddae250 a2=0 a3=7ffdfddae23c items=0 ppid=1729 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:46:40.413000 audit[1894]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.413000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff05e32b60 a2=0 a3=7fff05e32b4c items=0 ppid=1729 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:46:40.417000 audit[1896]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.417000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd11647620 a2=0 a3=7ffd1164760c items=0 ppid=1729 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:46:40.423000 audit[1899]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:46:40.423000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdeab3da0 a2=0 a3=7ffcdeab3d8c items=0 ppid=1729 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:46:40.427000 audit[1901]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:46:40.427000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff60e31680 a2=0 a3=7fff60e3166c items=0 ppid=1729 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.427000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.428000 audit[1901]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:46:40.428000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff60e31680 a2=0 a3=7fff60e3166c items=0 ppid=1729 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.428000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.723855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount297601762.mount: Deactivated successfully. Apr 12 18:46:40.776000 audit[1903]: NETFILTER_CFG table=filter:65 family=2 entries=11 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.776000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd48889710 a2=0 a3=7ffd488896fc items=0 ppid=1729 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.776000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.777000 audit[1903]: NETFILTER_CFG table=nat:66 family=2 entries=35 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.777000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd48889710 a2=0 a3=7ffd488896fc items=0 ppid=1729 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.814603 kubelet[1533]: E0412 18:46:40.814540 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:41.008141 kubelet[1533]: E0412 18:46:41.006192 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:41.086377 kubelet[1533]: E0412 18:46:41.086312 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.086377 kubelet[1533]: W0412 18:46:41.086342 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.086377 kubelet[1533]: E0412 18:46:41.086373 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.086735 kubelet[1533]: E0412 18:46:41.086710 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.086735 kubelet[1533]: W0412 18:46:41.086723 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.086854 kubelet[1533]: E0412 18:46:41.086745 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.087200 kubelet[1533]: E0412 18:46:41.087175 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.087200 kubelet[1533]: W0412 18:46:41.087197 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.087403 kubelet[1533]: E0412 18:46:41.087221 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.087581 kubelet[1533]: E0412 18:46:41.087560 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.087581 kubelet[1533]: W0412 18:46:41.087580 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.087729 kubelet[1533]: E0412 18:46:41.087609 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.087977 kubelet[1533]: E0412 18:46:41.087952 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.088128 kubelet[1533]: W0412 18:46:41.087980 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.088128 kubelet[1533]: E0412 18:46:41.088000 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.088341 kubelet[1533]: E0412 18:46:41.088323 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.088341 kubelet[1533]: W0412 18:46:41.088339 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.088503 kubelet[1533]: E0412 18:46:41.088358 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.088838 kubelet[1533]: E0412 18:46:41.088818 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.088838 kubelet[1533]: W0412 18:46:41.088836 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.089048 kubelet[1533]: E0412 18:46:41.088859 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.089327 kubelet[1533]: E0412 18:46:41.089294 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.089327 kubelet[1533]: W0412 18:46:41.089319 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.089519 kubelet[1533]: E0412 18:46:41.089340 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.089994 kubelet[1533]: E0412 18:46:41.089971 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.089994 kubelet[1533]: W0412 18:46:41.089991 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.090260 kubelet[1533]: E0412 18:46:41.090012 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.090340 kubelet[1533]: E0412 18:46:41.090328 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.090398 kubelet[1533]: W0412 18:46:41.090342 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.090398 kubelet[1533]: E0412 18:46:41.090361 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.090746 kubelet[1533]: E0412 18:46:41.090724 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.090746 kubelet[1533]: W0412 18:46:41.090743 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.090908 kubelet[1533]: E0412 18:46:41.090763 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.091140 kubelet[1533]: E0412 18:46:41.091107 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.091140 kubelet[1533]: W0412 18:46:41.091124 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.091400 kubelet[1533]: E0412 18:46:41.091144 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.091498 kubelet[1533]: E0412 18:46:41.091477 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.091498 kubelet[1533]: W0412 18:46:41.091493 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.091659 kubelet[1533]: E0412 18:46:41.091513 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.092357 kubelet[1533]: E0412 18:46:41.091979 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.092357 kubelet[1533]: W0412 18:46:41.092005 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.092357 kubelet[1533]: E0412 18:46:41.092062 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.092593 kubelet[1533]: E0412 18:46:41.092400 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.092593 kubelet[1533]: W0412 18:46:41.092414 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.092593 kubelet[1533]: E0412 18:46:41.092433 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.092763 kubelet[1533]: E0412 18:46:41.092714 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.092763 kubelet[1533]: W0412 18:46:41.092727 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.092763 kubelet[1533]: E0412 18:46:41.092746 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.093160 kubelet[1533]: E0412 18:46:41.093140 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.093160 kubelet[1533]: W0412 18:46:41.093157 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.093350 kubelet[1533]: E0412 18:46:41.093176 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.093480 kubelet[1533]: E0412 18:46:41.093459 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.093480 kubelet[1533]: W0412 18:46:41.093475 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.093606 kubelet[1533]: E0412 18:46:41.093493 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.094004 kubelet[1533]: E0412 18:46:41.093973 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.094004 kubelet[1533]: W0412 18:46:41.093999 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.094244 kubelet[1533]: E0412 18:46:41.094064 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.094422 kubelet[1533]: E0412 18:46:41.094401 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.094422 kubelet[1533]: W0412 18:46:41.094419 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.094571 kubelet[1533]: E0412 18:46:41.094439 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.186702 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.188162 kubelet[1533]: W0412 18:46:41.186727 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.186755 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.187187 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.188162 kubelet[1533]: W0412 18:46:41.187203 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.187246 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.187586 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.188162 kubelet[1533]: W0412 18:46:41.187598 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.187625 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.188162 kubelet[1533]: E0412 18:46:41.187928 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.188862 kubelet[1533]: W0412 18:46:41.187940 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.188862 kubelet[1533]: E0412 18:46:41.187968 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189152 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.189975 kubelet[1533]: W0412 18:46:41.189168 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189304 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189519 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.189975 kubelet[1533]: W0412 18:46:41.189529 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189552 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189847 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.189975 kubelet[1533]: W0412 18:46:41.189858 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.189975 kubelet[1533]: E0412 18:46:41.189881 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.190990 kubelet[1533]: E0412 18:46:41.190764 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.190990 kubelet[1533]: W0412 18:46:41.190785 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.190990 kubelet[1533]: E0412 18:46:41.190922 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.191756 kubelet[1533]: E0412 18:46:41.191412 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.191756 kubelet[1533]: W0412 18:46:41.191427 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.191756 kubelet[1533]: E0412 18:46:41.191451 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.192256 kubelet[1533]: E0412 18:46:41.192228 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.192416 kubelet[1533]: W0412 18:46:41.192370 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.192528 kubelet[1533]: E0412 18:46:41.192510 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.193264 kubelet[1533]: E0412 18:46:41.192752 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.193264 kubelet[1533]: W0412 18:46:41.192768 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.193264 kubelet[1533]: E0412 18:46:41.192790 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.193568 kubelet[1533]: E0412 18:46:41.193547 1533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:41.193568 kubelet[1533]: W0412 18:46:41.193565 1533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:41.193779 kubelet[1533]: E0412 18:46:41.193586 1533 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:41.364902 env[1149]: time="2024-04-12T18:46:41.362142888Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.368081 env[1149]: time="2024-04-12T18:46:41.368005867Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.370622 env[1149]: time="2024-04-12T18:46:41.370579273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.373114 env[1149]: time="2024-04-12T18:46:41.373076103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.374264 env[1149]: time="2024-04-12T18:46:41.374219013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:46:41.376822 env[1149]: time="2024-04-12T18:46:41.376764417Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:46:41.391737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3584293573.mount: Deactivated successfully. Apr 12 18:46:41.398068 env[1149]: time="2024-04-12T18:46:41.397991733Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c\"" Apr 12 18:46:41.398774 env[1149]: time="2024-04-12T18:46:41.398733842Z" level=info msg="StartContainer for \"59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c\"" Apr 12 18:46:41.432578 systemd[1]: run-containerd-runc-k8s.io-59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c-runc.pptTLz.mount: Deactivated successfully. Apr 12 18:46:41.438171 systemd[1]: Started cri-containerd-59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c.scope. Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fef18161a88 items=0 ppid=1640 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383431393338626362393835646264313931336137623637636536 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit: BPF prog-id=84 op=LOAD Apr 12 18:46:41.460000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022c6e8 items=0 ppid=1640 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383431393338626362393835646264313931336137623637636536 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit: BPF prog-id=85 op=LOAD Apr 12 18:46:41.460000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022c738 items=0 ppid=1640 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383431393338626362393835646264313931336137623637636536 Apr 12 18:46:41.460000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:46:41.460000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.460000 audit: BPF prog-id=86 op=LOAD Apr 12 18:46:41.460000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022c7c8 items=0 ppid=1640 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383431393338626362393835646264313931336137623637636536 Apr 12 18:46:41.486051 env[1149]: time="2024-04-12T18:46:41.485956999Z" level=info msg="StartContainer for \"59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c\" returns successfully" Apr 12 18:46:41.497960 systemd[1]: cri-containerd-59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c.scope: Deactivated successfully. Apr 12 18:46:41.501000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:46:41.810000 audit[1986]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:41.815347 kubelet[1533]: E0412 18:46:41.815250 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:41.818100 kernel: kauditd_printk_skb: 431 callbacks suppressed Apr 12 18:46:41.818224 kernel: audit: type=1325 audit(1712947601.810:721): table=filter:67 family=2 entries=8 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:41.810000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffed75e540 a2=0 a3=7fffed75e52c items=0 ppid=1729 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.873099 kernel: audit: type=1300 audit(1712947601.810:721): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffed75e540 a2=0 a3=7fffed75e52c items=0 ppid=1729 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:41.873000 audit[1986]: NETFILTER_CFG table=nat:68 family=2 entries=56 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:41.890075 kernel: audit: type=1327 audit(1712947601.810:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:41.890149 kernel: audit: type=1325 audit(1712947601.873:722): table=nat:68 family=2 entries=56 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:41.873000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffed75e540 a2=0 a3=7fffed75e52c items=0 ppid=1729 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.906874 env[1149]: time="2024-04-12T18:46:41.906818850Z" level=info msg="shim disconnected" id=59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c Apr 12 18:46:41.907829 env[1149]: time="2024-04-12T18:46:41.907796910Z" level=warning msg="cleaning up after shim disconnected" id=59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c namespace=k8s.io Apr 12 18:46:41.908001 env[1149]: time="2024-04-12T18:46:41.907977516Z" level=info msg="cleaning up dead shim" Apr 12 18:46:41.921382 env[1149]: time="2024-04-12T18:46:41.921329013Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:46:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1988 runtime=io.containerd.runc.v2\n" Apr 12 18:46:41.939156 kernel: audit: type=1300 audit(1712947601.873:722): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffed75e540 a2=0 a3=7fffed75e52c items=0 ppid=1729 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.939340 kernel: audit: type=1327 audit(1712947601.873:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:41.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:42.031163 env[1149]: time="2024-04-12T18:46:42.031112386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:46:42.388131 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-59841938bcb985dbd1913a7b67ce6d2816a9d47f86283abb93f3d8cc2f03ba9c-rootfs.mount: Deactivated successfully. Apr 12 18:46:42.816092 kubelet[1533]: E0412 18:46:42.815941 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:42.833615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4010358403.mount: Deactivated successfully. Apr 12 18:46:43.006744 kubelet[1533]: E0412 18:46:43.006656 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:43.816549 kubelet[1533]: E0412 18:46:43.816469 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:44.817274 kubelet[1533]: E0412 18:46:44.817205 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:45.008220 kubelet[1533]: E0412 18:46:45.008180 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:45.817809 kubelet[1533]: E0412 18:46:45.817759 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:46.125467 env[1149]: time="2024-04-12T18:46:46.125300729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:46.128906 env[1149]: time="2024-04-12T18:46:46.128855415Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:46.131592 env[1149]: time="2024-04-12T18:46:46.131549051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:46.134121 env[1149]: time="2024-04-12T18:46:46.134084124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:46.135068 env[1149]: time="2024-04-12T18:46:46.135003883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:46:46.138501 env[1149]: time="2024-04-12T18:46:46.138446037Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:46:46.153985 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1186554840.mount: Deactivated successfully. Apr 12 18:46:46.162061 env[1149]: time="2024-04-12T18:46:46.161981827Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412\"" Apr 12 18:46:46.162908 env[1149]: time="2024-04-12T18:46:46.162866108Z" level=info msg="StartContainer for \"ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412\"" Apr 12 18:46:46.189757 systemd[1]: Started cri-containerd-ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412.scope. Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.240618 kernel: audit: type=1400 audit(1712947606.218:723): avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7c21928208 items=0 ppid=1640 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:46.275203 kernel: audit: type=1300 audit(1712947606.218:723): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7c21928208 items=0 ppid=1640 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:46.305135 kernel: audit: type=1327 audit(1712947606.218:723): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386362303465323839366362386233666561303632333764313037 Apr 12 18:46:46.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386362303465323839366362386233666561303632333764313037 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.331053 kernel: audit: type=1400 audit(1712947606.218:724): avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.331278 env[1149]: time="2024-04-12T18:46:46.331010874Z" level=info msg="StartContainer for \"ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412\" returns successfully" Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.218000 audit: BPF prog-id=87 op=LOAD Apr 12 18:46:46.218000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e5ff8 items=0 ppid=1640 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:46.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386362303465323839366362386233666561303632333764313037 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit: BPF prog-id=88 op=LOAD Apr 12 18:46:46.239000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ae048 items=0 ppid=1640 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:46.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386362303465323839366362386233666561303632333764313037 Apr 12 18:46:46.239000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:46:46.239000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:46.239000 audit: BPF prog-id=89 op=LOAD Apr 12 18:46:46.239000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ae0d8 items=0 ppid=1640 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:46.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386362303465323839366362386233666561303632333764313037 Apr 12 18:46:46.817877 kubelet[1533]: E0412 18:46:46.817839 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:46.999862 env[1149]: time="2024-04-12T18:46:46.999772203Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:46:47.002471 systemd[1]: cri-containerd-ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412.scope: Deactivated successfully. Apr 12 18:46:47.014853 kernel: kauditd_printk_skb: 39 callbacks suppressed Apr 12 18:46:47.015012 kernel: audit: type=1334 audit(1712947607.005:729): prog-id=89 op=UNLOAD Apr 12 18:46:47.005000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:46:47.017972 kubelet[1533]: E0412 18:46:47.016297 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:47.023636 kubelet[1533]: I0412 18:46:47.023609 1533 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:46:47.045670 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412-rootfs.mount: Deactivated successfully. Apr 12 18:46:47.754482 env[1149]: time="2024-04-12T18:46:47.754413986Z" level=info msg="shim disconnected" id=ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412 Apr 12 18:46:47.754482 env[1149]: time="2024-04-12T18:46:47.754485509Z" level=warning msg="cleaning up after shim disconnected" id=ab8cb04e2896cb8b3fea06237d107540b06fbe6660053811dd2aa3942894c412 namespace=k8s.io Apr 12 18:46:47.755241 env[1149]: time="2024-04-12T18:46:47.754500807Z" level=info msg="cleaning up dead shim" Apr 12 18:46:47.766533 env[1149]: time="2024-04-12T18:46:47.766466930Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:46:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2057 runtime=io.containerd.runc.v2\n" Apr 12 18:46:47.818686 kubelet[1533]: E0412 18:46:47.818609 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:48.048471 env[1149]: time="2024-04-12T18:46:48.048313123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:46:48.468207 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:46:48.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:48.492186 kernel: audit: type=1131 audit(1712947608.467:730): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:48.509000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:46:48.509000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:46:48.524799 kernel: audit: type=1334 audit(1712947608.509:731): prog-id=72 op=UNLOAD Apr 12 18:46:48.524929 kernel: audit: type=1334 audit(1712947608.509:732): prog-id=71 op=UNLOAD Apr 12 18:46:48.524976 kernel: audit: type=1334 audit(1712947608.509:733): prog-id=70 op=UNLOAD Apr 12 18:46:48.509000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:46:48.819293 kubelet[1533]: E0412 18:46:48.819110 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:49.016234 systemd[1]: Created slice kubepods-besteffort-podb6b6983f_32b2_47cf_9d27_0eda23916877.slice. Apr 12 18:46:49.020572 env[1149]: time="2024-04-12T18:46:49.020513985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lgcz9,Uid:b6b6983f-32b2-47cf-9d27-0eda23916877,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:49.189985 env[1149]: time="2024-04-12T18:46:49.189428184Z" level=error msg="Failed to destroy network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:49.192643 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b-shm.mount: Deactivated successfully. Apr 12 18:46:49.193588 env[1149]: time="2024-04-12T18:46:49.193524141Z" level=error msg="encountered an error cleaning up failed sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:49.193819 env[1149]: time="2024-04-12T18:46:49.193772752Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lgcz9,Uid:b6b6983f-32b2-47cf-9d27-0eda23916877,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:49.195337 kubelet[1533]: E0412 18:46:49.194315 1533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:49.195337 kubelet[1533]: E0412 18:46:49.194480 1533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:49.195337 kubelet[1533]: E0412 18:46:49.194582 1533 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lgcz9" Apr 12 18:46:49.195642 kubelet[1533]: E0412 18:46:49.195255 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lgcz9_calico-system(b6b6983f-32b2-47cf-9d27-0eda23916877)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lgcz9_calico-system(b6b6983f-32b2-47cf-9d27-0eda23916877)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:49.820017 kubelet[1533]: E0412 18:46:49.819927 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:50.056900 kubelet[1533]: I0412 18:46:50.056849 1533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:46:50.057898 env[1149]: time="2024-04-12T18:46:50.057831662Z" level=info msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" Apr 12 18:46:50.125060 env[1149]: time="2024-04-12T18:46:50.124634812Z" level=error msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" failed" error="failed to destroy network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:50.125317 kubelet[1533]: E0412 18:46:50.125289 1533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:46:50.125460 kubelet[1533]: E0412 18:46:50.125435 1533 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b"} Apr 12 18:46:50.125539 kubelet[1533]: E0412 18:46:50.125530 1533 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6b6983f-32b2-47cf-9d27-0eda23916877\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:50.125663 kubelet[1533]: E0412 18:46:50.125599 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6b6983f-32b2-47cf-9d27-0eda23916877\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lgcz9" podUID="b6b6983f-32b2-47cf-9d27-0eda23916877" Apr 12 18:46:50.135060 kubelet[1533]: I0412 18:46:50.134878 1533 topology_manager.go:215] "Topology Admit Handler" podUID="17ae1343-46e7-47ab-998a-3472b2016a6e" podNamespace="default" podName="nginx-deployment-6d5f899847-ldcqw" Apr 12 18:46:50.145396 systemd[1]: Created slice kubepods-besteffort-pod17ae1343_46e7_47ab_998a_3472b2016a6e.slice. Apr 12 18:46:50.174419 kubelet[1533]: I0412 18:46:50.174372 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tddz7\" (UniqueName: \"kubernetes.io/projected/17ae1343-46e7-47ab-998a-3472b2016a6e-kube-api-access-tddz7\") pod \"nginx-deployment-6d5f899847-ldcqw\" (UID: \"17ae1343-46e7-47ab-998a-3472b2016a6e\") " pod="default/nginx-deployment-6d5f899847-ldcqw" Apr 12 18:46:50.454547 env[1149]: time="2024-04-12T18:46:50.453090496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ldcqw,Uid:17ae1343-46e7-47ab-998a-3472b2016a6e,Namespace:default,Attempt:0,}" Apr 12 18:46:50.621249 env[1149]: time="2024-04-12T18:46:50.621148918Z" level=error msg="Failed to destroy network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:50.628199 env[1149]: time="2024-04-12T18:46:50.621651068Z" level=error msg="encountered an error cleaning up failed sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:50.628199 env[1149]: time="2024-04-12T18:46:50.621733030Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ldcqw,Uid:17ae1343-46e7-47ab-998a-3472b2016a6e,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:50.624048 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890-shm.mount: Deactivated successfully. Apr 12 18:46:50.628536 kubelet[1533]: E0412 18:46:50.622047 1533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:50.628536 kubelet[1533]: E0412 18:46:50.622125 1533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ldcqw" Apr 12 18:46:50.628536 kubelet[1533]: E0412 18:46:50.622158 1533 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ldcqw" Apr 12 18:46:50.628817 kubelet[1533]: E0412 18:46:50.622236 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-ldcqw_default(17ae1343-46e7-47ab-998a-3472b2016a6e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-ldcqw_default(17ae1343-46e7-47ab-998a-3472b2016a6e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ldcqw" podUID="17ae1343-46e7-47ab-998a-3472b2016a6e" Apr 12 18:46:50.821318 kubelet[1533]: E0412 18:46:50.820168 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:51.060059 kubelet[1533]: I0412 18:46:51.059665 1533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:46:51.060867 env[1149]: time="2024-04-12T18:46:51.060821737Z" level=info msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" Apr 12 18:46:51.124446 env[1149]: time="2024-04-12T18:46:51.123898845Z" level=error msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" failed" error="failed to destroy network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:51.125055 kubelet[1533]: E0412 18:46:51.124930 1533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:46:51.125055 kubelet[1533]: E0412 18:46:51.124984 1533 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890"} Apr 12 18:46:51.125451 kubelet[1533]: E0412 18:46:51.125321 1533 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"17ae1343-46e7-47ab-998a-3472b2016a6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:51.125451 kubelet[1533]: E0412 18:46:51.125400 1533 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"17ae1343-46e7-47ab-998a-3472b2016a6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ldcqw" podUID="17ae1343-46e7-47ab-998a-3472b2016a6e" Apr 12 18:46:51.820854 kubelet[1533]: E0412 18:46:51.820761 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:52.821679 kubelet[1533]: E0412 18:46:52.821604 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:53.821869 kubelet[1533]: E0412 18:46:53.821780 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:54.210147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4070551884.mount: Deactivated successfully. Apr 12 18:46:54.271663 env[1149]: time="2024-04-12T18:46:54.271569691Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:54.274797 env[1149]: time="2024-04-12T18:46:54.274721160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:54.277546 env[1149]: time="2024-04-12T18:46:54.277485310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:54.279948 env[1149]: time="2024-04-12T18:46:54.279894288Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:54.280748 env[1149]: time="2024-04-12T18:46:54.280698302Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:46:54.309721 env[1149]: time="2024-04-12T18:46:54.309639344Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:46:54.331471 env[1149]: time="2024-04-12T18:46:54.331388056Z" level=info msg="CreateContainer within sandbox \"a09dfd5d03bf1b71a13b6867a2a0b136db62359f4cf26ecca6cc89a8d6861f27\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf\"" Apr 12 18:46:54.332321 env[1149]: time="2024-04-12T18:46:54.332281453Z" level=info msg="StartContainer for \"f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf\"" Apr 12 18:46:54.365814 systemd[1]: Started cri-containerd-f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf.scope. Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fddbc240c18 items=0 ppid=1640 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:54.447990 kernel: audit: type=1400 audit(1712947614.392:734): avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.448214 kernel: audit: type=1300 audit(1712947614.392:734): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fddbc240c18 items=0 ppid=1640 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:54.448266 kernel: audit: type=1327 audit(1712947614.392:734): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613639393931303061343966636534343532653532616139663064 Apr 12 18:46:54.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613639393931303061343966636534343532653532616139663064 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.522277 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.522471 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.543440 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.546189 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.589671 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.589870 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.609372 env[1149]: time="2024-04-12T18:46:54.609304584Z" level=info msg="StartContainer for \"f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf\" returns successfully" Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.637091 kernel: audit: type=1400 audit(1712947614.392:735): avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.392000 audit: BPF prog-id=90 op=LOAD Apr 12 18:46:54.392000 audit[2193]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002f8918 items=0 ppid=1640 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:54.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613639393931303061343966636534343532653532616139663064 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.414000 audit: BPF prog-id=91 op=LOAD Apr 12 18:46:54.414000 audit[2193]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002f8968 items=0 ppid=1640 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:54.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613639393931303061343966636534343532653532616139663064 Apr 12 18:46:54.477000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:46:54.477000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:54.477000 audit: BPF prog-id=92 op=LOAD Apr 12 18:46:54.477000 audit[2193]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002f89f8 items=0 ppid=1640 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:54.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613639393931303061343966636534343532653532616139663064 Apr 12 18:46:54.703092 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:46:54.703281 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:46:54.810073 kubelet[1533]: E0412 18:46:54.810010 1533 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:54.822417 kubelet[1533]: E0412 18:46:54.822345 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:55.085473 kubelet[1533]: I0412 18:46:55.084988 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-bks82" podStartSLOduration=2.786747086 podCreationTimestamp="2024-04-12 18:46:36 +0000 UTC" firstStartedPulling="2024-04-12 18:46:37.982904042 +0000 UTC m=+3.707446509" lastFinishedPulling="2024-04-12 18:46:54.281095399 +0000 UTC m=+20.005637859" observedRunningTime="2024-04-12 18:46:55.084899812 +0000 UTC m=+20.809442294" watchObservedRunningTime="2024-04-12 18:46:55.084938436 +0000 UTC m=+20.809480914" Apr 12 18:46:55.822905 kubelet[1533]: E0412 18:46:55.822842 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:56.072562 kubelet[1533]: I0412 18:46:56.072527 1533 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:46:56.097000 audit[2300]: AVC avc: denied { write } for pid=2300 comm="tee" name="fd" dev="proc" ino=18942 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.097000 audit[2300]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd51ac395f a2=241 a3=1b6 items=1 ppid=2261 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.097000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:46:56.097000 audit: PATH item=0 name="/dev/fd/63" inode=18927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.112000 audit[2315]: AVC avc: denied { write } for pid=2315 comm="tee" name="fd" dev="proc" ino=18949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.113000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=19926 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.113000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbd9f295d a2=241 a3=1b6 items=1 ppid=2265 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.117000 audit[2308]: AVC avc: denied { write } for pid=2308 comm="tee" name="fd" dev="proc" ino=18954 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.117000 audit[2308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf914c94d a2=241 a3=1b6 items=1 ppid=2257 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.113000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:46:56.113000 audit: PATH item=0 name="/dev/fd/63" inode=19917 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.113000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.117000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:46:56.117000 audit: PATH item=0 name="/dev/fd/63" inode=18937 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.112000 audit[2315]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda715195d a2=241 a3=1b6 items=1 ppid=2266 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.112000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:46:56.112000 audit: PATH item=0 name="/dev/fd/63" inode=19916 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.112000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.133000 audit[2324]: AVC avc: denied { write } for pid=2324 comm="tee" name="fd" dev="proc" ino=18959 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.133000 audit[2324]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc8a7d95d a2=241 a3=1b6 items=1 ppid=2269 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.133000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:46:56.133000 audit: PATH item=0 name="/dev/fd/63" inode=18945 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.133000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.137000 audit[2327]: AVC avc: denied { write } for pid=2327 comm="tee" name="fd" dev="proc" ino=18965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.137000 audit[2327]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfbb1495e a2=241 a3=1b6 items=1 ppid=2274 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.137000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:46:56.137000 audit: PATH item=0 name="/dev/fd/63" inode=19928 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.140000 audit[2329]: AVC avc: denied { write } for pid=2329 comm="tee" name="fd" dev="proc" ino=18967 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:56.140000 audit[2329]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9040794e a2=241 a3=1b6 items=1 ppid=2259 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.140000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:46:56.140000 audit: PATH item=0 name="/dev/fd/63" inode=19929 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:56.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:56.502060 kernel: Initializing XFRM netlink socket Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit: BPF prog-id=93 op=LOAD Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5d2e68c0 a2=70 a3=7f7bdf572000 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit: BPF prog-id=94 op=LOAD Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5d2e68c0 a2=70 a3=6f items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc5d2e6870 a2=70 a3=7ffc5d2e68c0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit: BPF prog-id=95 op=LOAD Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc5d2e6850 a2=70 a3=7ffc5d2e68c0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit: BPF prog-id=95 op=UNLOAD Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5d2e6930 a2=70 a3=0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5d2e6920 a2=70 a3=0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.676000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.676000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5d2e6890 a2=70 a3=0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.676000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.677000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.677000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc5d2e6960 a2=70 a3=1b98e10 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.677000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc5d2e6960 a2=70 a3=1b95880 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.679000 audit: BPF prog-id=96 op=LOAD Apr 12 18:46:56.679000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5d2e6880 a2=70 a3=0 items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:56.684000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.684000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdfda1b070 a2=70 a3=fff80800 items=0 ppid=2268 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:46:56.684000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:56.684000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdfda1af40 a2=70 a3=3 items=0 ppid=2268 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:46:56.697000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:46:56.785000 audit[2422]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:56.785000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffee1136560 a2=0 a3=7ffee113654c items=0 ppid=2268 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.785000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:56.786000 audit[2423]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:56.787000 audit[2426]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:56.787000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff98551c10 a2=0 a3=556abd3b6000 items=0 ppid=2268 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:56.786000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffce2b098d0 a2=0 a3=7ffce2b098bc items=0 ppid=2268 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:56.795000 audit[2424]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:56.795000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc5e969bb0 a2=0 a3=7ffc5e969b9c items=0 ppid=2268 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:56.823782 kubelet[1533]: E0412 18:46:56.823719 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:57.524275 systemd-networkd[1025]: vxlan.calico: Link UP Apr 12 18:46:57.524292 systemd-networkd[1025]: vxlan.calico: Gained carrier Apr 12 18:46:57.824965 kubelet[1533]: E0412 18:46:57.824706 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:58.736934 kubelet[1533]: I0412 18:46:58.736867 1533 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:46:58.763253 systemd[1]: run-containerd-runc-k8s.io-f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf-runc.NeE8Qd.mount: Deactivated successfully. Apr 12 18:46:58.794866 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Apr 12 18:46:58.825448 kubelet[1533]: E0412 18:46:58.825369 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:46:58.861050 systemd[1]: run-containerd-runc-k8s.io-f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf-runc.9WstMM.mount: Deactivated successfully. Apr 12 18:46:59.826416 kubelet[1533]: E0412 18:46:59.826351 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:00.827542 kubelet[1533]: E0412 18:47:00.827457 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:01.828518 kubelet[1533]: E0412 18:47:01.828449 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:02.804711 update_engine[1135]: I0412 18:47:02.804647 1135 update_attempter.cc:509] Updating boot flags... Apr 12 18:47:02.829049 kubelet[1533]: E0412 18:47:02.828979 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:03.009016 env[1149]: time="2024-04-12T18:47:03.008960083Z" level=info msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.128 [INFO][2524] k8s.go 585: Cleaning up netns ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.129 [INFO][2524] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" iface="eth0" netns="/var/run/netns/cni-ac55f704-7dc0-30c8-088a-6b8a0610073d" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.130 [INFO][2524] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" iface="eth0" netns="/var/run/netns/cni-ac55f704-7dc0-30c8-088a-6b8a0610073d" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.130 [INFO][2524] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" iface="eth0" netns="/var/run/netns/cni-ac55f704-7dc0-30c8-088a-6b8a0610073d" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.130 [INFO][2524] k8s.go 592: Releasing IP address(es) ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.130 [INFO][2524] utils.go 188: Calico CNI releasing IP address ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.157 [INFO][2532] ipam_plugin.go 415: Releasing address using handleID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.157 [INFO][2532] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.157 [INFO][2532] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.166 [WARNING][2532] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.166 [INFO][2532] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.168 [INFO][2532] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:03.171575 env[1149]: 2024-04-12 18:47:03.170 [INFO][2524] k8s.go 598: Teardown processing complete. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:03.175366 systemd[1]: run-netns-cni\x2dac55f704\x2d7dc0\x2d30c8\x2d088a\x2d6b8a0610073d.mount: Deactivated successfully. Apr 12 18:47:03.177252 env[1149]: time="2024-04-12T18:47:03.175733899Z" level=info msg="TearDown network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" successfully" Apr 12 18:47:03.177252 env[1149]: time="2024-04-12T18:47:03.175795649Z" level=info msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" returns successfully" Apr 12 18:47:03.177252 env[1149]: time="2024-04-12T18:47:03.176690075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ldcqw,Uid:17ae1343-46e7-47ab-998a-3472b2016a6e,Namespace:default,Attempt:1,}" Apr 12 18:47:03.350555 systemd-networkd[1025]: cali1be35b0327b: Link UP Apr 12 18:47:03.364646 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:03.365087 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1be35b0327b: link becomes ready Apr 12 18:47:03.365322 systemd-networkd[1025]: cali1be35b0327b: Gained carrier Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.246 [INFO][2538] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0 nginx-deployment-6d5f899847- default 17ae1343-46e7-47ab-998a-3472b2016a6e 952 0 2024-04-12 18:46:50 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.4 nginx-deployment-6d5f899847-ldcqw eth0 default [] [] [kns.default ksa.default.default] cali1be35b0327b [] []}} ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.247 [INFO][2538] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.293 [INFO][2550] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" HandleID="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.307 [INFO][2550] ipam_plugin.go 268: Auto assigning IP ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" HandleID="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b08e0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.4", "pod":"nginx-deployment-6d5f899847-ldcqw", "timestamp":"2024-04-12 18:47:03.293555456 +0000 UTC"}, Hostname:"10.128.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.307 [INFO][2550] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.307 [INFO][2550] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.307 [INFO][2550] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.4' Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.309 [INFO][2550] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.315 [INFO][2550] ipam.go 372: Looking up existing affinities for host host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.320 [INFO][2550] ipam.go 489: Trying affinity for 192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.322 [INFO][2550] ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.326 [INFO][2550] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.326 [INFO][2550] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.328 [INFO][2550] ipam.go 1682: Creating new handle: k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13 Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.333 [INFO][2550] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.344 [INFO][2550] ipam.go 1216: Successfully claimed IPs: [192.168.38.193/26] block=192.168.38.192/26 handle="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.344 [INFO][2550] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.193/26] handle="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" host="10.128.0.4" Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.344 [INFO][2550] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:03.384187 env[1149]: 2024-04-12 18:47:03.344 [INFO][2550] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.193/26] IPv6=[] ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" HandleID="k8s-pod-network.55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.347 [INFO][2538] k8s.go 385: Populated endpoint ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"17ae1343-46e7-47ab-998a-3472b2016a6e", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"", Pod:"nginx-deployment-6d5f899847-ldcqw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1be35b0327b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.347 [INFO][2538] k8s.go 386: Calico CNI using IPs: [192.168.38.193/32] ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.347 [INFO][2538] dataplane_linux.go 68: Setting the host side veth name to cali1be35b0327b ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.367 [INFO][2538] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.367 [INFO][2538] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"17ae1343-46e7-47ab-998a-3472b2016a6e", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13", Pod:"nginx-deployment-6d5f899847-ldcqw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1be35b0327b", MAC:"b6:cd:b7:ff:50:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:03.387700 env[1149]: 2024-04-12 18:47:03.374 [INFO][2538] k8s.go 498: Wrote updated endpoint to datastore ContainerID="55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13" Namespace="default" Pod="nginx-deployment-6d5f899847-ldcqw" WorkloadEndpoint="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:03.435674 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:47:03.435850 kernel: audit: type=1325 audit(1712947623.412:767): table=filter:73 family=2 entries=36 op=nft_register_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:03.412000 audit[2578]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:03.436238 env[1149]: time="2024-04-12T18:47:03.418227019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:03.436238 env[1149]: time="2024-04-12T18:47:03.418324274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:03.436238 env[1149]: time="2024-04-12T18:47:03.418363268Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:03.436238 env[1149]: time="2024-04-12T18:47:03.418743847Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13 pid=2579 runtime=io.containerd.runc.v2 Apr 12 18:47:03.412000 audit[2578]: SYSCALL arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7ffe6491d150 a2=0 a3=7ffe6491d13c items=0 ppid=2268 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.449356 systemd[1]: Started cri-containerd-55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13.scope. Apr 12 18:47:03.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:03.495930 kernel: audit: type=1300 audit(1712947623.412:767): arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7ffe6491d150 a2=0 a3=7ffe6491d13c items=0 ppid=2268 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.496118 kernel: audit: type=1327 audit(1712947623.412:767): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.546205 kernel: audit: type=1400 audit(1712947623.503:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.546434 kernel: audit: type=1400 audit(1712947623.503:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.546519 kernel: audit: type=1400 audit(1712947623.503:770): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589642 kernel: audit: type=1400 audit(1712947623.503:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.613039 kernel: audit: type=1400 audit(1712947623.503:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.655533 kernel: audit: type=1400 audit(1712947623.503:773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.656633 kernel: audit: type=1400 audit(1712947623.503:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.545000 audit: BPF prog-id=97 op=LOAD Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2579 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653539303235323635313035643932356530643765653664386630 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2579 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653539303235323635313035643932356530643765653664386630 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.549000 audit: BPF prog-id=98 op=LOAD Apr 12 18:47:03.549000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025070 items=0 ppid=2579 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653539303235323635313035643932356530643765653664386630 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.566000 audit: BPF prog-id=99 op=LOAD Apr 12 18:47:03.566000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000250b8 items=0 ppid=2579 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653539303235323635313035643932356530643765653664386630 Apr 12 18:47:03.589000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:47:03.589000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:03.589000 audit: BPF prog-id=100 op=LOAD Apr 12 18:47:03.589000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000254c8 items=0 ppid=2579 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:03.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653539303235323635313035643932356530643765653664386630 Apr 12 18:47:03.691882 env[1149]: time="2024-04-12T18:47:03.691726745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ldcqw,Uid:17ae1343-46e7-47ab-998a-3472b2016a6e,Namespace:default,Attempt:1,} returns sandbox id \"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13\"" Apr 12 18:47:03.696693 env[1149]: time="2024-04-12T18:47:03.696640135Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:47:03.829497 kubelet[1533]: E0412 18:47:03.829409 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:04.830373 kubelet[1533]: E0412 18:47:04.830295 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:05.009645 env[1149]: time="2024-04-12T18:47:05.009590109Z" level=info msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" Apr 12 18:47:05.065337 systemd-networkd[1025]: cali1be35b0327b: Gained IPv6LL Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.088 [INFO][2630] k8s.go 585: Cleaning up netns ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.088 [INFO][2630] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" iface="eth0" netns="/var/run/netns/cni-734d1b32-8d6f-17ff-2759-978dd5f6002f" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.089 [INFO][2630] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" iface="eth0" netns="/var/run/netns/cni-734d1b32-8d6f-17ff-2759-978dd5f6002f" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.089 [INFO][2630] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" iface="eth0" netns="/var/run/netns/cni-734d1b32-8d6f-17ff-2759-978dd5f6002f" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.089 [INFO][2630] k8s.go 592: Releasing IP address(es) ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.089 [INFO][2630] utils.go 188: Calico CNI releasing IP address ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.136 [INFO][2636] ipam_plugin.go 415: Releasing address using handleID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.136 [INFO][2636] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.137 [INFO][2636] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.145 [WARNING][2636] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.145 [INFO][2636] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.148 [INFO][2636] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:05.152003 env[1149]: 2024-04-12 18:47:05.149 [INFO][2630] k8s.go 598: Teardown processing complete. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:05.156105 systemd[1]: run-netns-cni\x2d734d1b32\x2d8d6f\x2d17ff\x2d2759\x2d978dd5f6002f.mount: Deactivated successfully. Apr 12 18:47:05.157952 env[1149]: time="2024-04-12T18:47:05.157891123Z" level=info msg="TearDown network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" successfully" Apr 12 18:47:05.158121 env[1149]: time="2024-04-12T18:47:05.158094892Z" level=info msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" returns successfully" Apr 12 18:47:05.159065 env[1149]: time="2024-04-12T18:47:05.159004922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lgcz9,Uid:b6b6983f-32b2-47cf-9d27-0eda23916877,Namespace:calico-system,Attempt:1,}" Apr 12 18:47:05.354191 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:05.353216 systemd-networkd[1025]: calicd93277b2d7: Link UP Apr 12 18:47:05.364660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd93277b2d7: link becomes ready Apr 12 18:47:05.366896 systemd-networkd[1025]: calicd93277b2d7: Gained carrier Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.246 [INFO][2642] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.4-k8s-csi--node--driver--lgcz9-eth0 csi-node-driver- calico-system b6b6983f-32b2-47cf-9d27-0eda23916877 961 0 2024-04-12 18:46:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.4 csi-node-driver-lgcz9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calicd93277b2d7 [] []}} ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.246 [INFO][2642] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.300 [INFO][2654] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" HandleID="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.312 [INFO][2654] ipam_plugin.go 268: Auto assigning IP ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" HandleID="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c8a0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.4", "pod":"csi-node-driver-lgcz9", "timestamp":"2024-04-12 18:47:05.299988142 +0000 UTC"}, Hostname:"10.128.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.312 [INFO][2654] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.312 [INFO][2654] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.312 [INFO][2654] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.4' Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.314 [INFO][2654] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.319 [INFO][2654] ipam.go 372: Looking up existing affinities for host host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.323 [INFO][2654] ipam.go 489: Trying affinity for 192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.325 [INFO][2654] ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.328 [INFO][2654] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.328 [INFO][2654] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.330 [INFO][2654] ipam.go 1682: Creating new handle: k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.334 [INFO][2654] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.340 [INFO][2654] ipam.go 1216: Successfully claimed IPs: [192.168.38.194/26] block=192.168.38.192/26 handle="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.340 [INFO][2654] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.194/26] handle="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" host="10.128.0.4" Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.340 [INFO][2654] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:05.379079 env[1149]: 2024-04-12 18:47:05.340 [INFO][2654] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.194/26] IPv6=[] ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" HandleID="k8s-pod-network.9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.342 [INFO][2642] k8s.go 385: Populated endpoint ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-csi--node--driver--lgcz9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6b6983f-32b2-47cf-9d27-0eda23916877", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"", Pod:"csi-node-driver-lgcz9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicd93277b2d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.342 [INFO][2642] k8s.go 386: Calico CNI using IPs: [192.168.38.194/32] ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.342 [INFO][2642] dataplane_linux.go 68: Setting the host side veth name to calicd93277b2d7 ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.366 [INFO][2642] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.368 [INFO][2642] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-csi--node--driver--lgcz9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6b6983f-32b2-47cf-9d27-0eda23916877", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b", Pod:"csi-node-driver-lgcz9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicd93277b2d7", MAC:"c2:4e:80:28:48:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:05.380317 env[1149]: 2024-04-12 18:47:05.377 [INFO][2642] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b" Namespace="calico-system" Pod="csi-node-driver-lgcz9" WorkloadEndpoint="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:05.433505 env[1149]: time="2024-04-12T18:47:05.433316518Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:05.433505 env[1149]: time="2024-04-12T18:47:05.433376204Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:05.435857 env[1149]: time="2024-04-12T18:47:05.433395054Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:05.436919 env[1149]: time="2024-04-12T18:47:05.436858456Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b pid=2682 runtime=io.containerd.runc.v2 Apr 12 18:47:05.436000 audit[2681]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:05.436000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffe7d186350 a2=0 a3=7ffe7d18633c items=0 ppid=2268 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:05.475988 systemd[1]: Started cri-containerd-9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b.scope. Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.502000 audit: BPF prog-id=101 op=LOAD Apr 12 18:47:05.504000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.504000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2682 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964356337383730613436623835633465313761636232643830613661 Apr 12 18:47:05.504000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.504000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2682 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964356337383730613436623835633465313761636232643830613661 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.505000 audit: BPF prog-id=102 op=LOAD Apr 12 18:47:05.505000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00038e190 items=0 ppid=2682 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964356337383730613436623835633465313761636232643830613661 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.506000 audit: BPF prog-id=103 op=LOAD Apr 12 18:47:05.506000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00038e1d8 items=0 ppid=2682 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964356337383730613436623835633465313761636232643830613661 Apr 12 18:47:05.507000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:47:05.508000 audit: BPF prog-id=102 op=UNLOAD Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:05.508000 audit: BPF prog-id=104 op=LOAD Apr 12 18:47:05.508000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00038e5e8 items=0 ppid=2682 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:05.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964356337383730613436623835633465313761636232643830613661 Apr 12 18:47:05.529278 env[1149]: time="2024-04-12T18:47:05.529222279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lgcz9,Uid:b6b6983f-32b2-47cf-9d27-0eda23916877,Namespace:calico-system,Attempt:1,} returns sandbox id \"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b\"" Apr 12 18:47:05.830920 kubelet[1533]: E0412 18:47:05.830811 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:06.709588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1175168325.mount: Deactivated successfully. Apr 12 18:47:06.831858 kubelet[1533]: E0412 18:47:06.831782 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:07.304335 systemd-networkd[1025]: calicd93277b2d7: Gained IPv6LL Apr 12 18:47:07.832727 kubelet[1533]: E0412 18:47:07.832662 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:07.842046 env[1149]: time="2024-04-12T18:47:07.841962297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:07.845398 env[1149]: time="2024-04-12T18:47:07.845344202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:07.848099 env[1149]: time="2024-04-12T18:47:07.848046956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:07.850682 env[1149]: time="2024-04-12T18:47:07.850634977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:07.851568 env[1149]: time="2024-04-12T18:47:07.851511117Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:47:07.853497 env[1149]: time="2024-04-12T18:47:07.853443443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:47:07.858207 env[1149]: time="2024-04-12T18:47:07.858156188Z" level=info msg="CreateContainer within sandbox \"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:47:07.880371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1116799908.mount: Deactivated successfully. Apr 12 18:47:07.890411 env[1149]: time="2024-04-12T18:47:07.890353386Z" level=info msg="CreateContainer within sandbox \"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"68c1f18f1911c1a197db0cec447efa133029824134d8404bfac1e1b79b0ca747\"" Apr 12 18:47:07.891685 env[1149]: time="2024-04-12T18:47:07.891611818Z" level=info msg="StartContainer for \"68c1f18f1911c1a197db0cec447efa133029824134d8404bfac1e1b79b0ca747\"" Apr 12 18:47:07.929719 systemd[1]: Started cri-containerd-68c1f18f1911c1a197db0cec447efa133029824134d8404bfac1e1b79b0ca747.scope. Apr 12 18:47:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit: BPF prog-id=105 op=LOAD Apr 12 18:47:07.950000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.950000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2579 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633166313866313931316331613139376462306365633434376566 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2579 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633166313866313931316331613139376462306365633434376566 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit: BPF prog-id=106 op=LOAD Apr 12 18:47:07.951000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000247870 items=0 ppid=2579 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633166313866313931316331613139376462306365633434376566 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit: BPF prog-id=107 op=LOAD Apr 12 18:47:07.951000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002478b8 items=0 ppid=2579 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633166313866313931316331613139376462306365633434376566 Apr 12 18:47:07.951000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:47:07.951000 audit: BPF prog-id=106 op=UNLOAD Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:07.951000 audit: BPF prog-id=108 op=LOAD Apr 12 18:47:07.951000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000247cc8 items=0 ppid=2579 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633166313866313931316331613139376462306365633434376566 Apr 12 18:47:07.976117 env[1149]: time="2024-04-12T18:47:07.976014521Z" level=info msg="StartContainer for \"68c1f18f1911c1a197db0cec447efa133029824134d8404bfac1e1b79b0ca747\" returns successfully" Apr 12 18:47:08.832940 kubelet[1533]: E0412 18:47:08.832883 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:08.875998 systemd[1]: run-containerd-runc-k8s.io-68c1f18f1911c1a197db0cec447efa133029824134d8404bfac1e1b79b0ca747-runc.UoaUPk.mount: Deactivated successfully. Apr 12 18:47:09.110067 env[1149]: time="2024-04-12T18:47:09.109650490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:09.112921 env[1149]: time="2024-04-12T18:47:09.112870284Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:09.115375 env[1149]: time="2024-04-12T18:47:09.115327931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:09.117770 env[1149]: time="2024-04-12T18:47:09.117708695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:09.118648 env[1149]: time="2024-04-12T18:47:09.118594554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:47:09.121435 env[1149]: time="2024-04-12T18:47:09.121384497Z" level=info msg="CreateContainer within sandbox \"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:47:09.137955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount801487022.mount: Deactivated successfully. Apr 12 18:47:09.149204 env[1149]: time="2024-04-12T18:47:09.149136089Z" level=info msg="CreateContainer within sandbox \"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"23a7866478f379f93ee97f1ebc4a8f1473381b2e79d6c1650783b49ec14add72\"" Apr 12 18:47:09.149878 env[1149]: time="2024-04-12T18:47:09.149835785Z" level=info msg="StartContainer for \"23a7866478f379f93ee97f1ebc4a8f1473381b2e79d6c1650783b49ec14add72\"" Apr 12 18:47:09.182920 systemd[1]: Started cri-containerd-23a7866478f379f93ee97f1ebc4a8f1473381b2e79d6c1650783b49ec14add72.scope. Apr 12 18:47:09.233428 kernel: kauditd_printk_skb: 167 callbacks suppressed Apr 12 18:47:09.233703 kernel: audit: type=1400 audit(1712947629.205:823): avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.205000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.205000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f193e929b98 items=0 ppid=2682 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.266972 kernel: audit: type=1300 audit(1712947629.205:823): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f193e929b98 items=0 ppid=2682 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.267645 kernel: audit: type=1327 audit(1712947629.205:823): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233613738363634373866333739663933656539376631656263346138 Apr 12 18:47:09.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233613738363634373866333739663933656539376631656263346138 Apr 12 18:47:09.316317 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.316759 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.362136 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.362308 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.363756 env[1149]: time="2024-04-12T18:47:09.363693358Z" level=info msg="StartContainer for \"23a7866478f379f93ee97f1ebc4a8f1473381b2e79d6c1650783b49ec14add72\" returns successfully" Apr 12 18:47:09.366187 env[1149]: time="2024-04-12T18:47:09.366142557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.380141 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.402070 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.423215 kernel: audit: type=1400 audit(1712947629.206:824): avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.206000 audit: BPF prog-id=109 op=LOAD Apr 12 18:47:09.206000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00031a7a8 items=0 ppid=2682 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233613738363634373866333739663933656539376631656263346138 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit: BPF prog-id=110 op=LOAD Apr 12 18:47:09.232000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00031a7f8 items=0 ppid=2682 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233613738363634373866333739663933656539376631656263346138 Apr 12 18:47:09.232000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:47:09.232000 audit: BPF prog-id=109 op=UNLOAD Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:09.232000 audit: BPF prog-id=111 op=LOAD Apr 12 18:47:09.232000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00031a888 items=0 ppid=2682 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233613738363634373866333739663933656539376631656263346138 Apr 12 18:47:09.833187 kubelet[1533]: E0412 18:47:09.833125 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:10.617000 audit[2824]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.617000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff9103d0c0 a2=0 a3=7fff9103d0ac items=0 ppid=1729 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.618000 audit[2824]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.618000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff9103d0c0 a2=0 a3=0 items=0 ppid=1729 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.641000 audit[2826]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.641000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffca7b93f60 a2=0 a3=7ffca7b93f4c items=0 ppid=1729 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.644180 env[1149]: time="2024-04-12T18:47:10.644111013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:10.642000 audit[2826]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.642000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca7b93f60 a2=0 a3=0 items=0 ppid=1729 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.647050 env[1149]: time="2024-04-12T18:47:10.646980897Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:10.649455 env[1149]: time="2024-04-12T18:47:10.649416830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:10.651665 env[1149]: time="2024-04-12T18:47:10.651627099Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:10.652425 env[1149]: time="2024-04-12T18:47:10.652373891Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:47:10.655785 env[1149]: time="2024-04-12T18:47:10.655741784Z" level=info msg="CreateContainer within sandbox \"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:47:10.664213 kubelet[1533]: I0412 18:47:10.664175 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-ldcqw" podStartSLOduration=16.507991667 podCreationTimestamp="2024-04-12 18:46:50 +0000 UTC" firstStartedPulling="2024-04-12 18:47:03.695878443 +0000 UTC m=+29.420420917" lastFinishedPulling="2024-04-12 18:47:07.852006653 +0000 UTC m=+33.576549130" observedRunningTime="2024-04-12 18:47:08.140457527 +0000 UTC m=+33.865000009" watchObservedRunningTime="2024-04-12 18:47:10.66411988 +0000 UTC m=+36.388662356" Apr 12 18:47:10.665079 kubelet[1533]: I0412 18:47:10.664546 1533 topology_manager.go:215] "Topology Admit Handler" podUID="dccc9630-62a2-4d8e-acfe-46a76e9ec832" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 18:47:10.676790 systemd[1]: Created slice kubepods-besteffort-poddccc9630_62a2_4d8e_acfe_46a76e9ec832.slice. Apr 12 18:47:10.680536 env[1149]: time="2024-04-12T18:47:10.680476151Z" level=info msg="CreateContainer within sandbox \"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0fec13b6c14591b13ba77f4e0e590524366776d460b750e030a364b72f40727f\"" Apr 12 18:47:10.681336 env[1149]: time="2024-04-12T18:47:10.681241693Z" level=info msg="StartContainer for \"0fec13b6c14591b13ba77f4e0e590524366776d460b750e030a364b72f40727f\"" Apr 12 18:47:10.712998 systemd[1]: Started cri-containerd-0fec13b6c14591b13ba77f4e0e590524366776d460b750e030a364b72f40727f.scope. Apr 12 18:47:10.729216 systemd[1]: run-containerd-runc-k8s.io-0fec13b6c14591b13ba77f4e0e590524366776d460b750e030a364b72f40727f-runc.HvioxW.mount: Deactivated successfully. Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f8414ab49f8 items=0 ppid=2682 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066656331336236633134353931623133626137376634653065353930 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.749000 audit: BPF prog-id=112 op=LOAD Apr 12 18:47:10.749000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000235238 items=0 ppid=2682 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066656331336236633134353931623133626137376634653065353930 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit: BPF prog-id=113 op=LOAD Apr 12 18:47:10.750000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000235288 items=0 ppid=2682 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066656331336236633134353931623133626137376634653065353930 Apr 12 18:47:10.750000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:47:10.750000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:10.750000 audit: BPF prog-id=114 op=LOAD Apr 12 18:47:10.750000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000235318 items=0 ppid=2682 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066656331336236633134353931623133626137376634653065353930 Apr 12 18:47:10.754916 kubelet[1533]: I0412 18:47:10.754877 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkzrw\" (UniqueName: \"kubernetes.io/projected/dccc9630-62a2-4d8e-acfe-46a76e9ec832-kube-api-access-lkzrw\") pod \"nfs-server-provisioner-0\" (UID: \"dccc9630-62a2-4d8e-acfe-46a76e9ec832\") " pod="default/nfs-server-provisioner-0" Apr 12 18:47:10.755302 kubelet[1533]: I0412 18:47:10.755240 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/dccc9630-62a2-4d8e-acfe-46a76e9ec832-data\") pod \"nfs-server-provisioner-0\" (UID: \"dccc9630-62a2-4d8e-acfe-46a76e9ec832\") " pod="default/nfs-server-provisioner-0" Apr 12 18:47:10.776174 env[1149]: time="2024-04-12T18:47:10.776116053Z" level=info msg="StartContainer for \"0fec13b6c14591b13ba77f4e0e590524366776d460b750e030a364b72f40727f\" returns successfully" Apr 12 18:47:10.833650 kubelet[1533]: E0412 18:47:10.833575 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:10.965085 kubelet[1533]: I0412 18:47:10.962656 1533 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:47:10.965085 kubelet[1533]: I0412 18:47:10.962709 1533 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:47:10.982071 env[1149]: time="2024-04-12T18:47:10.981972255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dccc9630-62a2-4d8e-acfe-46a76e9ec832,Namespace:default,Attempt:0,}" Apr 12 18:47:11.151770 systemd-networkd[1025]: cali60e51b789ff: Link UP Apr 12 18:47:11.165638 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:11.165834 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:47:11.168187 systemd-networkd[1025]: cali60e51b789ff: Gained carrier Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.053 [INFO][2865] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.4-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default dccc9630-62a2-4d8e-acfe-46a76e9ec832 1010 0 2024-04-12 18:47:10 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.4 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.054 [INFO][2865] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.092 [INFO][2878] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" HandleID="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Workload="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.105 [INFO][2878] ipam_plugin.go 268: Auto assigning IP ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" HandleID="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Workload="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004adcf0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.4", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:47:11.092081201 +0000 UTC"}, Hostname:"10.128.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.105 [INFO][2878] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.105 [INFO][2878] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.105 [INFO][2878] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.4' Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.107 [INFO][2878] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.114 [INFO][2878] ipam.go 372: Looking up existing affinities for host host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.121 [INFO][2878] ipam.go 489: Trying affinity for 192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.123 [INFO][2878] ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.128 [INFO][2878] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.128 [INFO][2878] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.130 [INFO][2878] ipam.go 1682: Creating new handle: k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.136 [INFO][2878] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.146 [INFO][2878] ipam.go 1216: Successfully claimed IPs: [192.168.38.195/26] block=192.168.38.192/26 handle="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.146 [INFO][2878] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.195/26] handle="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" host="10.128.0.4" Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.146 [INFO][2878] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:11.183133 env[1149]: 2024-04-12 18:47:11.146 [INFO][2878] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.195/26] IPv6=[] ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" HandleID="k8s-pod-network.7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Workload="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.186397 env[1149]: 2024-04-12 18:47:11.147 [INFO][2865] k8s.go 385: Populated endpoint ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dccc9630-62a2-4d8e-acfe-46a76e9ec832", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:11.186397 env[1149]: 2024-04-12 18:47:11.148 [INFO][2865] k8s.go 386: Calico CNI using IPs: [192.168.38.195/32] ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.186397 env[1149]: 2024-04-12 18:47:11.148 [INFO][2865] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.186397 env[1149]: 2024-04-12 18:47:11.169 [INFO][2865] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.186883 env[1149]: 2024-04-12 18:47:11.170 [INFO][2865] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dccc9630-62a2-4d8e-acfe-46a76e9ec832", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6a:9a:f4:3a:cf:41", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:11.186883 env[1149]: 2024-04-12 18:47:11.179 [INFO][2865] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.4-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:47:11.213086 env[1149]: time="2024-04-12T18:47:11.212911990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:11.213086 env[1149]: time="2024-04-12T18:47:11.212977686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:11.213086 env[1149]: time="2024-04-12T18:47:11.212997765Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:11.215053 env[1149]: time="2024-04-12T18:47:11.213697485Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a pid=2905 runtime=io.containerd.runc.v2 Apr 12 18:47:11.243000 audit[2926]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:11.243000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff125a3f30 a2=0 a3=7fff125a3f1c items=0 ppid=2268 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.243000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:11.264310 systemd[1]: Started cri-containerd-7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a.scope. Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.285000 audit: BPF prog-id=115 op=LOAD Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2905 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393663303065386338363839643162313631663362356330373934 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2905 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393663303065386338363839643162313631663362356330373934 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit: BPF prog-id=116 op=LOAD Apr 12 18:47:11.286000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000384790 items=0 ppid=2905 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393663303065386338363839643162313631663362356330373934 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit: BPF prog-id=117 op=LOAD Apr 12 18:47:11.286000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003847d8 items=0 ppid=2905 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393663303065386338363839643162313631663362356330373934 Apr 12 18:47:11.286000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:47:11.286000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:11.286000 audit: BPF prog-id=118 op=LOAD Apr 12 18:47:11.286000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000384be8 items=0 ppid=2905 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393663303065386338363839643162313631663362356330373934 Apr 12 18:47:11.326040 env[1149]: time="2024-04-12T18:47:11.325971196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dccc9630-62a2-4d8e-acfe-46a76e9ec832,Namespace:default,Attempt:0,} returns sandbox id \"7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a\"" Apr 12 18:47:11.328637 env[1149]: time="2024-04-12T18:47:11.328544740Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:47:11.834160 kubelet[1533]: E0412 18:47:11.833986 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:12.834297 kubelet[1533]: E0412 18:47:12.834223 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:13.001627 systemd-networkd[1025]: cali60e51b789ff: Gained IPv6LL Apr 12 18:47:13.835039 kubelet[1533]: E0412 18:47:13.834959 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:13.950240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3507988303.mount: Deactivated successfully. Apr 12 18:47:14.809849 kubelet[1533]: E0412 18:47:14.809770 1533 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:14.836202 kubelet[1533]: E0412 18:47:14.836127 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:15.837101 kubelet[1533]: E0412 18:47:15.837046 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:16.472756 env[1149]: time="2024-04-12T18:47:16.472672920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:16.476120 env[1149]: time="2024-04-12T18:47:16.476062571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:16.478993 env[1149]: time="2024-04-12T18:47:16.478940367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:16.481649 env[1149]: time="2024-04-12T18:47:16.481597287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:16.482768 env[1149]: time="2024-04-12T18:47:16.482709540Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 18:47:16.485584 env[1149]: time="2024-04-12T18:47:16.485528249Z" level=info msg="CreateContainer within sandbox \"7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:47:16.503765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4005286444.mount: Deactivated successfully. Apr 12 18:47:16.516220 env[1149]: time="2024-04-12T18:47:16.516145591Z" level=info msg="CreateContainer within sandbox \"7196c00e8c8689d1b161f3b5c07949ce37c2ce0ea0100f6d5ce45bfe2bbf7d8a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bd7752f639f49cfb515d21b5fdd811f23d37de09518542b41dab3f9cfd7e1a56\"" Apr 12 18:47:16.517184 env[1149]: time="2024-04-12T18:47:16.517128276Z" level=info msg="StartContainer for \"bd7752f639f49cfb515d21b5fdd811f23d37de09518542b41dab3f9cfd7e1a56\"" Apr 12 18:47:16.555596 systemd[1]: Started cri-containerd-bd7752f639f49cfb515d21b5fdd811f23d37de09518542b41dab3f9cfd7e1a56.scope. Apr 12 18:47:16.603001 kernel: kauditd_printk_skb: 148 callbacks suppressed Apr 12 18:47:16.603267 kernel: audit: type=1400 audit(1712947636.576:858): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.603321 kernel: audit: type=1400 audit(1712947636.576:859): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666143 kernel: audit: type=1400 audit(1712947636.576:860): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666302 kernel: audit: type=1400 audit(1712947636.576:861): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.687291 kernel: audit: type=1400 audit(1712947636.576:862): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.708323 kernel: audit: type=1400 audit(1712947636.576:863): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.730103 kernel: audit: type=1400 audit(1712947636.576:864): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.730375 kernel: audit: type=1400 audit(1712947636.576:865): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.776630 kernel: audit: type=1400 audit(1712947636.576:866): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.797692 env[1149]: time="2024-04-12T18:47:16.784728529Z" level=info msg="StartContainer for \"bd7752f639f49cfb515d21b5fdd811f23d37de09518542b41dab3f9cfd7e1a56\" returns successfully" Apr 12 18:47:16.798051 kernel: audit: type=1400 audit(1712947636.622:867): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.622000 audit: BPF prog-id=119 op=LOAD Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2905 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373735326636333966343963666235313564323162356664643831 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2905 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373735326636333966343963666235313564323162356664643831 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.623000 audit: BPF prog-id=120 op=LOAD Apr 12 18:47:16.623000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a4800 items=0 ppid=2905 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373735326636333966343963666235313564323162356664643831 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.643000 audit: BPF prog-id=121 op=LOAD Apr 12 18:47:16.643000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a4848 items=0 ppid=2905 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373735326636333966343963666235313564323162356664643831 Apr 12 18:47:16.666000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:47:16.666000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:16.666000 audit: BPF prog-id=122 op=LOAD Apr 12 18:47:16.666000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a4c58 items=0 ppid=2905 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373735326636333966343963666235313564323162356664643831 Apr 12 18:47:16.837781 kubelet[1533]: E0412 18:47:16.837737 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:16.859000 audit[2987]: AVC avc: denied { search } for pid=2987 comm="rpcbind" name="crypto" dev="proc" ino=21452 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:47:16.859000 audit[2987]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f54f5def0c0 a2=0 a3=0 items=0 ppid=2965 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 key=(null) Apr 12 18:47:16.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:47:16.904000 audit[2992]: AVC avc: denied { search } for pid=2992 comm="dbus-daemon" name="crypto" dev="proc" ino=21452 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:47:16.904000 audit[2992]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb1df81b0c0 a2=0 a3=0 items=0 ppid=2965 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 key=(null) Apr 12 18:47:16.904000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:47:16.908000 audit[2993]: AVC avc: denied { watch } for pid=2993 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c455,c842 tclass=dir permissive=0 Apr 12 18:47:16.908000 audit[2993]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=557fa1a540b0 a2=2c8 a3=7fff7ec3174c items=0 ppid=2965 pid=2993 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 key=(null) Apr 12 18:47:16.908000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:47:16.915000 audit[2994]: AVC avc: denied { read } for pid=2994 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23588 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:47:16.915000 audit[2994]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f9155f86320 a1=80000 a2=d a3=7ffe36d9b210 items=0 ppid=2965 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 key=(null) Apr 12 18:47:16.915000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:47:16.916000 audit[2994]: AVC avc: denied { search } for pid=2994 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21452 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:47:16.916000 audit[2994]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f91554da0c0 a2=0 a3=0 items=0 ppid=2965 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c842 key=(null) Apr 12 18:47:16.916000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:47:17.195877 kubelet[1533]: I0412 18:47:17.195819 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.040792478 podCreationTimestamp="2024-04-12 18:47:10 +0000 UTC" firstStartedPulling="2024-04-12 18:47:11.328132213 +0000 UTC m=+37.052674674" lastFinishedPulling="2024-04-12 18:47:16.483105848 +0000 UTC m=+42.207648311" observedRunningTime="2024-04-12 18:47:17.195615007 +0000 UTC m=+42.920157492" watchObservedRunningTime="2024-04-12 18:47:17.195766115 +0000 UTC m=+42.920308597" Apr 12 18:47:17.196183 kubelet[1533]: I0412 18:47:17.196085 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-lgcz9" podStartSLOduration=36.074830879 podCreationTimestamp="2024-04-12 18:46:36 +0000 UTC" firstStartedPulling="2024-04-12 18:47:05.53159182 +0000 UTC m=+31.256134285" lastFinishedPulling="2024-04-12 18:47:10.652766966 +0000 UTC m=+36.377309440" observedRunningTime="2024-04-12 18:47:11.182965277 +0000 UTC m=+36.907507760" watchObservedRunningTime="2024-04-12 18:47:17.196006034 +0000 UTC m=+42.920548515" Apr 12 18:47:17.210000 audit[3012]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.210000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffce642d80 a2=0 a3=7fffce642d6c items=0 ppid=1729 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.214000 audit[3012]: NETFILTER_CFG table=nat:81 family=2 entries=104 op=nft_register_chain pid=3012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.214000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fffce642d80 a2=0 a3=7fffce642d6c items=0 ppid=1729 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.497598 systemd[1]: run-containerd-runc-k8s.io-bd7752f639f49cfb515d21b5fdd811f23d37de09518542b41dab3f9cfd7e1a56-runc.emSnKM.mount: Deactivated successfully. Apr 12 18:47:17.838678 kubelet[1533]: E0412 18:47:17.838609 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:18.839849 kubelet[1533]: E0412 18:47:18.839777 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:19.840962 kubelet[1533]: E0412 18:47:19.840893 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:20.841774 kubelet[1533]: E0412 18:47:20.841694 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:21.842738 kubelet[1533]: E0412 18:47:21.842663 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:22.843044 kubelet[1533]: E0412 18:47:22.842974 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:23.843265 kubelet[1533]: E0412 18:47:23.843196 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:24.844199 kubelet[1533]: E0412 18:47:24.844121 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:25.845279 kubelet[1533]: E0412 18:47:25.845212 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:26.845910 kubelet[1533]: E0412 18:47:26.845851 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:26.947802 kubelet[1533]: I0412 18:47:26.947757 1533 topology_manager.go:215] "Topology Admit Handler" podUID="3994f8bb-b484-42e5-b2db-6251bbc2064d" podNamespace="default" podName="test-pod-1" Apr 12 18:47:26.954728 systemd[1]: Created slice kubepods-besteffort-pod3994f8bb_b484_42e5_b2db_6251bbc2064d.slice. Apr 12 18:47:27.062794 kubelet[1533]: I0412 18:47:27.062728 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v6p7t\" (UniqueName: \"kubernetes.io/projected/3994f8bb-b484-42e5-b2db-6251bbc2064d-kube-api-access-v6p7t\") pod \"test-pod-1\" (UID: \"3994f8bb-b484-42e5-b2db-6251bbc2064d\") " pod="default/test-pod-1" Apr 12 18:47:27.062794 kubelet[1533]: I0412 18:47:27.062804 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d750752d-3511-4a85-8c52-68e085d3f15a\" (UniqueName: \"kubernetes.io/nfs/3994f8bb-b484-42e5-b2db-6251bbc2064d-pvc-d750752d-3511-4a85-8c52-68e085d3f15a\") pod \"test-pod-1\" (UID: \"3994f8bb-b484-42e5-b2db-6251bbc2064d\") " pod="default/test-pod-1" Apr 12 18:47:27.196583 kernel: Failed to create system directory netfs Apr 12 18:47:27.196785 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:47:27.196831 kernel: audit: type=1400 audit(1712947647.189:883): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.189000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.225783 kernel: Failed to create system directory netfs Apr 12 18:47:27.225979 kernel: audit: type=1400 audit(1712947647.189:883): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.189000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.254169 kernel: Failed to create system directory netfs Apr 12 18:47:27.254349 kernel: audit: type=1400 audit(1712947647.189:883): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.189000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.282733 kernel: Failed to create system directory netfs Apr 12 18:47:27.282914 kernel: audit: type=1400 audit(1712947647.189:883): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.189000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.189000 audit[3026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e1d62195e0 a1=153bc a2=55e1d48f72b0 a3=5 items=0 ppid=466 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:27.189000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:47:27.356525 kernel: audit: type=1300 audit(1712947647.189:883): arch=c000003e syscall=175 success=yes exit=0 a0=55e1d62195e0 a1=153bc a2=55e1d48f72b0 a3=5 items=0 ppid=466 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:27.356653 kernel: audit: type=1327 audit(1712947647.189:883): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:47:27.362523 kernel: Failed to create system directory fscache Apr 12 18:47:27.362647 kernel: audit: type=1400 audit(1712947647.328:884): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.390806 kernel: Failed to create system directory fscache Apr 12 18:47:27.390941 kernel: audit: type=1400 audit(1712947647.328:884): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.419708 kernel: Failed to create system directory fscache Apr 12 18:47:27.419888 kernel: audit: type=1400 audit(1712947647.328:884): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.447707 kernel: Failed to create system directory fscache Apr 12 18:47:27.447879 kernel: audit: type=1400 audit(1712947647.328:884): avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.475891 kernel: Failed to create system directory fscache Apr 12 18:47:27.476125 kernel: Failed to create system directory fscache Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.486393 kernel: Failed to create system directory fscache Apr 12 18:47:27.486508 kernel: Failed to create system directory fscache Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.496915 kernel: Failed to create system directory fscache Apr 12 18:47:27.497040 kernel: Failed to create system directory fscache Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.507363 kernel: Failed to create system directory fscache Apr 12 18:47:27.507506 kernel: Failed to create system directory fscache Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.517892 kernel: Failed to create system directory fscache Apr 12 18:47:27.518050 kernel: Failed to create system directory fscache Apr 12 18:47:27.328000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.328000 audit[3026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e1d642e9c0 a1=4c0fc a2=55e1d48f72b0 a3=5 items=0 ppid=466 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:27.328000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:47:27.528037 kernel: FS-Cache: Loaded Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.578738 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.578861 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.578903 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.589004 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.589143 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.599279 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.599386 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.609646 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.609754 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.619869 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.619976 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.625074 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.635236 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.635329 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.645540 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.645611 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.655756 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.655834 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.666103 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.666205 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.676497 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.676608 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.686722 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.686819 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.696947 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.697069 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.707382 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.707525 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.717692 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.717803 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.727974 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.728124 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.738258 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.738370 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.743410 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.753584 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.753677 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.763821 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.763899 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.774102 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.774199 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.784511 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.784605 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.794759 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.794862 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.805154 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.805273 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.815466 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.815565 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.825780 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.825885 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.836100 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.836228 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.846508 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.846641 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.846909 kubelet[1533]: E0412 18:47:27.846874 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.856745 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.856824 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.866972 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.867103 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.877196 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.877290 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.887417 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.887499 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.897736 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.897845 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.907953 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.908073 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.914065 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.923427 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.923533 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.933707 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.933804 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.943932 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.944031 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.954160 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.954243 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.964469 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.964549 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.969630 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.979873 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.979974 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.990267 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.990367 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.000575 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.000679 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.010822 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.016628 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.017110 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.027444 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.028061 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.038423 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.043660 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.043749 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.053973 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.054052 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.064308 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.064396 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.074790 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.074893 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.085034 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.085111 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.095428 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.095527 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.105740 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.105824 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.115972 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.116113 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.126612 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.126715 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.132051 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.137138 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.147358 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.147471 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.152536 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.162819 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.162909 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.173361 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.173479 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.183792 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.183912 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.194012 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.194103 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.204579 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.204685 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.214800 kernel: Failed to create system directory sunrpc Apr 12 18:47:28.214911 kernel: Failed to create system directory sunrpc Apr 12 18:47:27.555000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.247957 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:47:28.248146 kernel: RPC: Registered udp transport module. Apr 12 18:47:28.248190 kernel: RPC: Registered tcp transport module. Apr 12 18:47:28.248235 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:47:27.555000 audit[3026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e1d647aad0 a1=1a7e9c a2=55e1d48f72b0 a3=5 items=6 ppid=466 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:27.555000 audit: CWD cwd="/" Apr 12 18:47:27.555000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PATH item=1 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PATH item=2 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PATH item=3 name=(null) inode=22920 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PATH item=4 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PATH item=5 name=(null) inode=22921 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:27.555000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.312831 kernel: Failed to create system directory nfs Apr 12 18:47:28.312954 kernel: Failed to create system directory nfs Apr 12 18:47:28.313005 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.322568 kernel: Failed to create system directory nfs Apr 12 18:47:28.322676 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.332329 kernel: Failed to create system directory nfs Apr 12 18:47:28.332402 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.342007 kernel: Failed to create system directory nfs Apr 12 18:47:28.342101 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.352154 kernel: Failed to create system directory nfs Apr 12 18:47:28.352250 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.357053 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.366810 kernel: Failed to create system directory nfs Apr 12 18:47:28.366927 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.376582 kernel: Failed to create system directory nfs Apr 12 18:47:28.376655 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.386315 kernel: Failed to create system directory nfs Apr 12 18:47:28.386405 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.396071 kernel: Failed to create system directory nfs Apr 12 18:47:28.396160 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.405882 kernel: Failed to create system directory nfs Apr 12 18:47:28.405972 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.415851 kernel: Failed to create system directory nfs Apr 12 18:47:28.416209 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.425789 kernel: Failed to create system directory nfs Apr 12 18:47:28.425883 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.431178 kernel: Failed to create system directory nfs Apr 12 18:47:28.443151 kernel: Failed to create system directory nfs Apr 12 18:47:28.443338 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.450719 kernel: Failed to create system directory nfs Apr 12 18:47:28.450855 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.460418 kernel: Failed to create system directory nfs Apr 12 18:47:28.460547 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.470165 kernel: Failed to create system directory nfs Apr 12 18:47:28.470298 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.479947 kernel: Failed to create system directory nfs Apr 12 18:47:28.480073 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.489670 kernel: Failed to create system directory nfs Apr 12 18:47:28.489792 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.499565 kernel: Failed to create system directory nfs Apr 12 18:47:28.499693 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.504419 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.514138 kernel: Failed to create system directory nfs Apr 12 18:47:28.514251 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.523783 kernel: Failed to create system directory nfs Apr 12 18:47:28.523910 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.528860 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.533834 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.543673 kernel: Failed to create system directory nfs Apr 12 18:47:28.543795 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.553780 kernel: Failed to create system directory nfs Apr 12 18:47:28.553895 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.563837 kernel: Failed to create system directory nfs Apr 12 18:47:28.563961 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.569141 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.574134 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.579122 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.588230 kernel: Failed to create system directory nfs Apr 12 18:47:28.588307 kernel: Failed to create system directory nfs Apr 12 18:47:28.292000 audit[3026]: AVC avc: denied { confidentiality } for pid=3026 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.619071 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:47:28.292000 audit[3026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e1d669b670 a1=16d85c a2=55e1d48f72b0 a3=5 items=0 ppid=466 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:28.292000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.679195 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.679310 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.679348 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.689015 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.699041 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.699126 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.700119 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.705108 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.714140 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.719193 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.720113 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.726581 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.734399 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.739644 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.747048 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.753045 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.763413 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.763520 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.768684 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.773946 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.781970 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.788135 systemd[1]: run-containerd-runc-k8s.io-f4a6999100a49fce4452e52aa9f0d92bddc9e956e3f415dc7b7bd9bb01dd18bf-runc.g5utqo.mount: Deactivated successfully. Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.800559 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.800684 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.802849 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.811654 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.817412 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.817507 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.827826 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.827917 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.832743 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.842952 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.843080 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.848221 kubelet[1533]: E0412 18:47:28.848160 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:28.852910 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.853012 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.862982 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.863080 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.872976 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.873087 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.883202 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.883339 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.893075 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.893197 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.898091 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.907891 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.907990 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.917757 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.917850 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.927624 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.927718 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.937547 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.942628 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.942786 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.952604 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.952691 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.962455 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.962547 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.972327 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.972431 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.982318 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.982437 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.992227 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.992325 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.002136 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.002237 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.012107 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.012221 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.022074 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.022170 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.027069 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.037187 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.037334 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.047112 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.047240 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.057088 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.057196 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.067102 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.067247 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.077036 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.077119 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.086915 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.087015 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.096796 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.096890 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.106697 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.106813 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.116583 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.116699 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.126475 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.126595 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.136370 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.136500 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.146344 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.146453 kernel: Failed to create system directory nfs4 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:28.655000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.156427 kernel: Failed to create system directory nfs4 Apr 12 18:47:29.311309 kernel: NFS: Registering the id_resolver key type Apr 12 18:47:29.311511 kernel: Key type id_resolver registered Apr 12 18:47:29.311562 kernel: Key type id_legacy registered Apr 12 18:47:28.655000 audit[3036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f73ddc0d010 a1=208ac4 a2=558e52e562b0 a3=5 items=0 ppid=466 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:28.655000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.343739 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.343942 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.343997 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.354099 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.354218 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.364395 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.364518 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.374622 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.374734 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.384846 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.384966 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.395079 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.395185 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.405314 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.405393 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.415540 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.415638 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.425766 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.425898 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.436042 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.436178 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.446399 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.446494 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.456931 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.457072 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.328000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:47:29.467204 kernel: Failed to create system directory rpcgss Apr 12 18:47:29.328000 audit[3057]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7990ba0010 a1=70c3c a2=55bdd97442b0 a3=5 items=0 ppid=466 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.328000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:47:29.509953 nfsidmap[3067]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Apr 12 18:47:29.533622 nfsidmap[3068]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Apr 12 18:47:29.548000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.548000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558874063d30 a2=10 a3=9fd2c6e8b21217ab items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:47:29.548000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.548000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558874063d30 a2=10 a3=9fd2c6e8b21217ab items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:47:29.548000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.548000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558874063d30 a2=10 a3=9fd2c6e8b21217ab items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:47:29.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:47:29.660920 env[1149]: time="2024-04-12T18:47:29.660748547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3994f8bb-b484-42e5-b2db-6251bbc2064d,Namespace:default,Attempt:0,}" Apr 12 18:47:29.848992 kubelet[1533]: E0412 18:47:29.848933 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:29.870621 systemd-networkd[1025]: cali5ec59c6bf6e: Link UP Apr 12 18:47:29.873140 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:29.881064 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:47:29.883409 systemd-networkd[1025]: cali5ec59c6bf6e: Gained carrier Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.727 [INFO][3069] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.4-k8s-test--pod--1-eth0 default 3994f8bb-b484-42e5-b2db-6251bbc2064d 1078 0 2024-04-12 18:47:11 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.4 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.728 [INFO][3069] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.762 [INFO][3081] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" HandleID="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Workload="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.784 [INFO][3081] ipam_plugin.go 268: Auto assigning IP ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" HandleID="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Workload="10.128.0.4-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281e60), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.4", "pod":"test-pod-1", "timestamp":"2024-04-12 18:47:29.762545149 +0000 UTC"}, Hostname:"10.128.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.784 [INFO][3081] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.784 [INFO][3081] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.784 [INFO][3081] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.4' Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.794 [INFO][3081] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.808 [INFO][3081] ipam.go 372: Looking up existing affinities for host host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.816 [INFO][3081] ipam.go 489: Trying affinity for 192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.824 [INFO][3081] ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.828 [INFO][3081] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.828 [INFO][3081] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.836 [INFO][3081] ipam.go 1682: Creating new handle: k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4 Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.845 [INFO][3081] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.862 [INFO][3081] ipam.go 1216: Successfully claimed IPs: [192.168.38.196/26] block=192.168.38.192/26 handle="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.862 [INFO][3081] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.196/26] handle="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" host="10.128.0.4" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.862 [INFO][3081] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.862 [INFO][3081] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.196/26] IPv6=[] ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" HandleID="k8s-pod-network.c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Workload="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.864 [INFO][3069] k8s.go 385: Populated endpoint ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3994f8bb-b484-42e5-b2db-6251bbc2064d", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:29.899076 env[1149]: 2024-04-12 18:47:29.864 [INFO][3069] k8s.go 386: Calico CNI using IPs: [192.168.38.196/32] ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.900425 env[1149]: 2024-04-12 18:47:29.864 [INFO][3069] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.900425 env[1149]: 2024-04-12 18:47:29.885 [INFO][3069] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.900425 env[1149]: 2024-04-12 18:47:29.885 [INFO][3069] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3994f8bb-b484-42e5-b2db-6251bbc2064d", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1e:93:a0:f3:47:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:29.900425 env[1149]: 2024-04-12 18:47:29.897 [INFO][3069] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.4-k8s-test--pod--1-eth0" Apr 12 18:47:29.920678 env[1149]: time="2024-04-12T18:47:29.919195561Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:29.920898 env[1149]: time="2024-04-12T18:47:29.919253095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:29.920898 env[1149]: time="2024-04-12T18:47:29.919270767Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:29.921271 env[1149]: time="2024-04-12T18:47:29.921159670Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4 pid=3106 runtime=io.containerd.runc.v2 Apr 12 18:47:29.949932 systemd[1]: Started cri-containerd-c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4.scope. Apr 12 18:47:29.969000 audit[3127]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:29.969000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe186d71e0 a2=0 a3=7ffe186d71cc items=0 ppid=2268 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.969000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.983000 audit: BPF prog-id=123 op=LOAD Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3106 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663539643163343138383037343339396239396362313738376161 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3106 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663539643163343138383037343339396239396362313738376161 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit: BPF prog-id=124 op=LOAD Apr 12 18:47:29.984000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000257b0 items=0 ppid=3106 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663539643163343138383037343339396239396362313738376161 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit: BPF prog-id=125 op=LOAD Apr 12 18:47:29.984000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000257f8 items=0 ppid=3106 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663539643163343138383037343339396239396362313738376161 Apr 12 18:47:29.984000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:47:29.984000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { perfmon } for pid=3115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit[3115]: AVC avc: denied { bpf } for pid=3115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:29.984000 audit: BPF prog-id=126 op=LOAD Apr 12 18:47:29.984000 audit[3115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025c08 items=0 ppid=3106 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663539643163343138383037343339396239396362313738376161 Apr 12 18:47:30.027277 env[1149]: time="2024-04-12T18:47:30.027216093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3994f8bb-b484-42e5-b2db-6251bbc2064d,Namespace:default,Attempt:0,} returns sandbox id \"c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4\"" Apr 12 18:47:30.029872 env[1149]: time="2024-04-12T18:47:30.029821203Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:47:30.249135 env[1149]: time="2024-04-12T18:47:30.246896466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:30.252132 env[1149]: time="2024-04-12T18:47:30.252076414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:30.255354 env[1149]: time="2024-04-12T18:47:30.255316967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:30.258946 env[1149]: time="2024-04-12T18:47:30.258898703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:30.259914 env[1149]: time="2024-04-12T18:47:30.259861471Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:47:30.262588 env[1149]: time="2024-04-12T18:47:30.262534748Z" level=info msg="CreateContainer within sandbox \"c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:47:30.283544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount554020191.mount: Deactivated successfully. Apr 12 18:47:30.288998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount859804145.mount: Deactivated successfully. Apr 12 18:47:30.290543 env[1149]: time="2024-04-12T18:47:30.290480629Z" level=info msg="CreateContainer within sandbox \"c7f59d1c4188074399b99cb1787aa9b9808ec3003d0093fe504aae2474a64fb4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ffb0edd81fe18f00e16aa4f46b9f493145064b918fcda750ec0f7cbd4095babd\"" Apr 12 18:47:30.291372 env[1149]: time="2024-04-12T18:47:30.291324347Z" level=info msg="StartContainer for \"ffb0edd81fe18f00e16aa4f46b9f493145064b918fcda750ec0f7cbd4095babd\"" Apr 12 18:47:30.318674 kubelet[1533]: I0412 18:47:30.318627 1533 topology_manager.go:215] "Topology Admit Handler" podUID="b4cc0caa-9a9e-4290-9eb8-0133a6842cbc" podNamespace="calico-apiserver" podName="calico-apiserver-59b7bc967d-g8d68" Apr 12 18:47:30.319000 audit[3163]: NETFILTER_CFG table=filter:83 family=2 entries=9 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.319000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2bc2b3d0 a2=0 a3=7ffc2bc2b3bc items=0 ppid=1729 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.324000 audit[3163]: NETFILTER_CFG table=nat:84 family=2 entries=44 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.324000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc2bc2b3d0 a2=0 a3=7ffc2bc2b3bc items=0 ppid=1729 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.328008 systemd[1]: Created slice kubepods-besteffort-podb4cc0caa_9a9e_4290_9eb8_0133a6842cbc.slice. Apr 12 18:47:30.340385 systemd[1]: Started cri-containerd-ffb0edd81fe18f00e16aa4f46b9f493145064b918fcda750ec0f7cbd4095babd.scope. Apr 12 18:47:30.343332 kubelet[1533]: I0412 18:47:30.342257 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b4cc0caa-9a9e-4290-9eb8-0133a6842cbc-calico-apiserver-certs\") pod \"calico-apiserver-59b7bc967d-g8d68\" (UID: \"b4cc0caa-9a9e-4290-9eb8-0133a6842cbc\") " pod="calico-apiserver/calico-apiserver-59b7bc967d-g8d68" Apr 12 18:47:30.343332 kubelet[1533]: I0412 18:47:30.342317 1533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-928p5\" (UniqueName: \"kubernetes.io/projected/b4cc0caa-9a9e-4290-9eb8-0133a6842cbc-kube-api-access-928p5\") pod \"calico-apiserver-59b7bc967d-g8d68\" (UID: \"b4cc0caa-9a9e-4290-9eb8-0133a6842cbc\") " pod="calico-apiserver/calico-apiserver-59b7bc967d-g8d68" Apr 12 18:47:30.347000 audit[3167]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.347000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd88cc0660 a2=0 a3=7ffd88cc064c items=0 ppid=1729 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.351000 audit[3167]: NETFILTER_CFG table=nat:86 family=2 entries=44 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.351000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd88cc0660 a2=0 a3=7ffd88cc064c items=0 ppid=1729 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.369000 audit: BPF prog-id=127 op=LOAD Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3106 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623065646438316665313866303065313661613466343662396634 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3106 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623065646438316665313866303065313661613466343662396634 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit: BPF prog-id=128 op=LOAD Apr 12 18:47:30.370000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00032d150 items=0 ppid=3106 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623065646438316665313866303065313661613466343662396634 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit: BPF prog-id=129 op=LOAD Apr 12 18:47:30.370000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00032d198 items=0 ppid=3106 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623065646438316665313866303065313661613466343662396634 Apr 12 18:47:30.370000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:47:30.370000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:30.370000 audit: BPF prog-id=130 op=LOAD Apr 12 18:47:30.370000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00032d5a8 items=0 ppid=3106 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623065646438316665313866303065313661613466343662396634 Apr 12 18:47:30.398189 env[1149]: time="2024-04-12T18:47:30.398125078Z" level=info msg="StartContainer for \"ffb0edd81fe18f00e16aa4f46b9f493145064b918fcda750ec0f7cbd4095babd\" returns successfully" Apr 12 18:47:30.443453 kubelet[1533]: E0412 18:47:30.443274 1533 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:47:30.443453 kubelet[1533]: E0412 18:47:30.443433 1533 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b4cc0caa-9a9e-4290-9eb8-0133a6842cbc-calico-apiserver-certs podName:b4cc0caa-9a9e-4290-9eb8-0133a6842cbc nodeName:}" failed. No retries permitted until 2024-04-12 18:47:30.943401976 +0000 UTC m=+56.667944453 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b4cc0caa-9a9e-4290-9eb8-0133a6842cbc-calico-apiserver-certs") pod "calico-apiserver-59b7bc967d-g8d68" (UID: "b4cc0caa-9a9e-4290-9eb8-0133a6842cbc") : secret "calico-apiserver-certs" not found Apr 12 18:47:30.849607 kubelet[1533]: E0412 18:47:30.849543 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:31.236912 env[1149]: time="2024-04-12T18:47:31.236575228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59b7bc967d-g8d68,Uid:b4cc0caa-9a9e-4290-9eb8-0133a6842cbc,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:47:31.273652 kubelet[1533]: I0412 18:47:31.273608 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.042363744 podCreationTimestamp="2024-04-12 18:47:11 +0000 UTC" firstStartedPulling="2024-04-12 18:47:30.029123713 +0000 UTC m=+55.753666177" lastFinishedPulling="2024-04-12 18:47:30.260268297 +0000 UTC m=+55.984810770" observedRunningTime="2024-04-12 18:47:31.272517996 +0000 UTC m=+56.997060478" watchObservedRunningTime="2024-04-12 18:47:31.273508337 +0000 UTC m=+56.998050815" Apr 12 18:47:31.432994 systemd-networkd[1025]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:47:31.497921 systemd-networkd[1025]: cali731006897b9: Link UP Apr 12 18:47:31.504102 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:31.513307 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali731006897b9: link becomes ready Apr 12 18:47:31.512754 systemd-networkd[1025]: cali731006897b9: Gained carrier Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.322 [INFO][3208] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0 calico-apiserver-59b7bc967d- calico-apiserver b4cc0caa-9a9e-4290-9eb8-0133a6842cbc 1131 0 2024-04-12 18:47:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59b7bc967d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.128.0.4 calico-apiserver-59b7bc967d-g8d68 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali731006897b9 [] []}} ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.322 [INFO][3208] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.359 [INFO][3219] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" HandleID="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Workload="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.411 [INFO][3219] ipam_plugin.go 268: Auto assigning IP ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" HandleID="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Workload="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000265860), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.128.0.4", "pod":"calico-apiserver-59b7bc967d-g8d68", "timestamp":"2024-04-12 18:47:31.359538598 +0000 UTC"}, Hostname:"10.128.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.411 [INFO][3219] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.411 [INFO][3219] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.411 [INFO][3219] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.4' Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.415 [INFO][3219] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.427 [INFO][3219] ipam.go 372: Looking up existing affinities for host host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.438 [INFO][3219] ipam.go 489: Trying affinity for 192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.451 [INFO][3219] ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.455 [INFO][3219] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.455 [INFO][3219] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.461 [INFO][3219] ipam.go 1682: Creating new handle: k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5 Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.468 [INFO][3219] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.492 [INFO][3219] ipam.go 1216: Successfully claimed IPs: [192.168.38.197/26] block=192.168.38.192/26 handle="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.492 [INFO][3219] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.197/26] handle="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" host="10.128.0.4" Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.492 [INFO][3219] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:31.530503 env[1149]: 2024-04-12 18:47:31.492 [INFO][3219] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.197/26] IPv6=[] ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" HandleID="k8s-pod-network.960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Workload="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.494 [INFO][3208] k8s.go 385: Populated endpoint ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0", GenerateName:"calico-apiserver-59b7bc967d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b4cc0caa-9a9e-4290-9eb8-0133a6842cbc", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59b7bc967d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"", Pod:"calico-apiserver-59b7bc967d-g8d68", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali731006897b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.494 [INFO][3208] k8s.go 386: Calico CNI using IPs: [192.168.38.197/32] ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.494 [INFO][3208] dataplane_linux.go 68: Setting the host side veth name to cali731006897b9 ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.514 [INFO][3208] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.515 [INFO][3208] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0", GenerateName:"calico-apiserver-59b7bc967d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b4cc0caa-9a9e-4290-9eb8-0133a6842cbc", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59b7bc967d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5", Pod:"calico-apiserver-59b7bc967d-g8d68", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali731006897b9", MAC:"8a:93:cb:10:9f:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:31.531852 env[1149]: 2024-04-12 18:47:31.528 [INFO][3208] k8s.go 498: Wrote updated endpoint to datastore ContainerID="960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-g8d68" WorkloadEndpoint="10.128.0.4-k8s-calico--apiserver--59b7bc967d--g8d68-eth0" Apr 12 18:47:31.554866 env[1149]: time="2024-04-12T18:47:31.554762648Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:31.555195 env[1149]: time="2024-04-12T18:47:31.555152549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:31.555411 env[1149]: time="2024-04-12T18:47:31.555373326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:31.555935 env[1149]: time="2024-04-12T18:47:31.555870521Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5 pid=3242 runtime=io.containerd.runc.v2 Apr 12 18:47:31.602604 systemd[1]: Started cri-containerd-960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5.scope. Apr 12 18:47:31.626000 audit[3276]: NETFILTER_CFG table=filter:87 family=2 entries=59 op=nft_register_chain pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:31.626000 audit[3276]: SYSCALL arch=c000003e syscall=46 success=yes exit=30140 a0=3 a1=7ffd3ddc4e40 a2=0 a3=7ffd3ddc4e2c items=0 ppid=2268 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.626000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.630000 audit: BPF prog-id=131 op=LOAD Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3242 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306135646433653163353739633834313362393161343238326436 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3242 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306135646433653163353739633834313362393161343238326436 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit: BPF prog-id=132 op=LOAD Apr 12 18:47:31.631000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001b7e20 items=0 ppid=3242 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306135646433653163353739633834313362393161343238326436 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit: BPF prog-id=133 op=LOAD Apr 12 18:47:31.631000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001b7e68 items=0 ppid=3242 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306135646433653163353739633834313362393161343238326436 Apr 12 18:47:31.631000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:47:31.631000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.631000 audit: BPF prog-id=134 op=LOAD Apr 12 18:47:31.631000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039e278 items=0 ppid=3242 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306135646433653163353739633834313362393161343238326436 Apr 12 18:47:31.676792 env[1149]: time="2024-04-12T18:47:31.676715869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59b7bc967d-g8d68,Uid:b4cc0caa-9a9e-4290-9eb8-0133a6842cbc,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5\"" Apr 12 18:47:31.678978 env[1149]: time="2024-04-12T18:47:31.678834442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:47:31.850343 kubelet[1533]: E0412 18:47:31.850280 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:32.851465 kubelet[1533]: E0412 18:47:32.851380 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:32.873663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1939888059.mount: Deactivated successfully. Apr 12 18:47:33.417845 systemd-networkd[1025]: cali731006897b9: Gained IPv6LL Apr 12 18:47:33.852332 kubelet[1533]: E0412 18:47:33.852238 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:34.174294 env[1149]: time="2024-04-12T18:47:34.173817604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.177548 env[1149]: time="2024-04-12T18:47:34.177494627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.179873 env[1149]: time="2024-04-12T18:47:34.179812043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.182137 env[1149]: time="2024-04-12T18:47:34.182096127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.182783 env[1149]: time="2024-04-12T18:47:34.182738874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:47:34.186430 env[1149]: time="2024-04-12T18:47:34.186377399Z" level=info msg="CreateContainer within sandbox \"960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:47:34.210723 env[1149]: time="2024-04-12T18:47:34.210650678Z" level=info msg="CreateContainer within sandbox \"960a5dd3e1c579c8413b91a4282d6be08c4f081fa69b366e61825c5fdd1a4be5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d1f4e8635381816c47801c98bcb33ea5de90fdd2316d256b6966f0b58299f89b\"" Apr 12 18:47:34.211721 env[1149]: time="2024-04-12T18:47:34.211679060Z" level=info msg="StartContainer for \"d1f4e8635381816c47801c98bcb33ea5de90fdd2316d256b6966f0b58299f89b\"" Apr 12 18:47:34.249913 systemd[1]: Started cri-containerd-d1f4e8635381816c47801c98bcb33ea5de90fdd2316d256b6966f0b58299f89b.scope. Apr 12 18:47:34.295004 kernel: kauditd_printk_skb: 533 callbacks suppressed Apr 12 18:47:34.295153 kernel: audit: type=1400 audit(1712947654.268:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.338628 kernel: audit: type=1400 audit(1712947654.268:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.338826 kernel: audit: type=1400 audit(1712947654.268:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.338867 kernel: audit: type=1400 audit(1712947654.268:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.379936 kernel: audit: type=1400 audit(1712947654.268:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.404841 kernel: audit: type=1400 audit(1712947654.268:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.405011 kernel: audit: type=1400 audit(1712947654.268:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.427163 kernel: audit: type=1400 audit(1712947654.268:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.436041 env[1149]: time="2024-04-12T18:47:34.435971070Z" level=info msg="StartContainer for \"d1f4e8635381816c47801c98bcb33ea5de90fdd2316d256b6966f0b58299f89b\" returns successfully" Apr 12 18:47:34.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.490763 kernel: audit: type=1400 audit(1712947654.268:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.490935 kernel: audit: type=1400 audit(1712947654.293:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.293000 audit: BPF prog-id=135 op=LOAD Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3242 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663465383633353338313831366334373830316339386263623333 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3242 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663465383633353338313831366334373830316339386263623333 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.294000 audit: BPF prog-id=136 op=LOAD Apr 12 18:47:34.294000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000213e70 items=0 ppid=3242 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663465383633353338313831366334373830316339386263623333 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit: BPF prog-id=137 op=LOAD Apr 12 18:47:34.295000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000213eb8 items=0 ppid=3242 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663465383633353338313831366334373830316339386263623333 Apr 12 18:47:34.295000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:47:34.295000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.295000 audit: BPF prog-id=138 op=LOAD Apr 12 18:47:34.295000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003882c8 items=0 ppid=3242 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431663465383633353338313831366334373830316339386263623333 Apr 12 18:47:34.810841 kubelet[1533]: E0412 18:47:34.810752 1533 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:34.852489 kubelet[1533]: E0412 18:47:34.852434 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:34.857049 env[1149]: time="2024-04-12T18:47:34.856983888Z" level=info msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" Apr 12 18:47:34.910000 audit[3341]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=3341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:34.910000 audit[3341]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe66f02d10 a2=0 a3=7ffe66f02cfc items=0 ppid=1729 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:34.912000 audit[3341]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=3341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:34.912000 audit[3341]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffe66f02d10 a2=0 a3=7ffe66f02cfc items=0 ppid=1729 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:34.977000 audit[3300]: AVC avc: denied { watch } for pid=3300 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_47_30.2825553448/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c752 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c314,c752 tclass=file permissive=0 Apr 12 18:47:34.977000 audit[3300]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00062a5a0 a2=fc6 a3=0 items=0 ppid=3242 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c752 key=(null) Apr 12 18:47:34.977000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.938 [WARNING][3335] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"17ae1343-46e7-47ab-998a-3472b2016a6e", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13", Pod:"nginx-deployment-6d5f899847-ldcqw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1be35b0327b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.939 [INFO][3335] k8s.go 585: Cleaning up netns ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.939 [INFO][3335] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" iface="eth0" netns="" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.939 [INFO][3335] k8s.go 592: Releasing IP address(es) ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.939 [INFO][3335] utils.go 188: Calico CNI releasing IP address ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.987 [INFO][3344] ipam_plugin.go 415: Releasing address using handleID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.987 [INFO][3344] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.987 [INFO][3344] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.996 [WARNING][3344] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.996 [INFO][3344] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.998 [INFO][3344] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:35.000611 env[1149]: 2024-04-12 18:47:34.999 [INFO][3335] k8s.go 598: Teardown processing complete. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.001606 env[1149]: time="2024-04-12T18:47:35.000671689Z" level=info msg="TearDown network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" successfully" Apr 12 18:47:35.001606 env[1149]: time="2024-04-12T18:47:35.000719770Z" level=info msg="StopPodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" returns successfully" Apr 12 18:47:35.001606 env[1149]: time="2024-04-12T18:47:35.001552870Z" level=info msg="RemovePodSandbox for \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" Apr 12 18:47:35.001769 env[1149]: time="2024-04-12T18:47:35.001599893Z" level=info msg="Forcibly stopping sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\"" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.083 [WARNING][3364] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"17ae1343-46e7-47ab-998a-3472b2016a6e", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"55e59025265105d925e0d7ee6d8f0042b19a8d77ac9feadf6dfb38ec472abb13", Pod:"nginx-deployment-6d5f899847-ldcqw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1be35b0327b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.083 [INFO][3364] k8s.go 585: Cleaning up netns ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.083 [INFO][3364] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" iface="eth0" netns="" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.083 [INFO][3364] k8s.go 592: Releasing IP address(es) ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.083 [INFO][3364] utils.go 188: Calico CNI releasing IP address ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.109 [INFO][3371] ipam_plugin.go 415: Releasing address using handleID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.109 [INFO][3371] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.109 [INFO][3371] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.119 [WARNING][3371] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.119 [INFO][3371] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" HandleID="k8s-pod-network.4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Workload="10.128.0.4-k8s-nginx--deployment--6d5f899847--ldcqw-eth0" Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.121 [INFO][3371] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:35.124857 env[1149]: 2024-04-12 18:47:35.122 [INFO][3364] k8s.go 598: Teardown processing complete. ContainerID="4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890" Apr 12 18:47:35.124857 env[1149]: time="2024-04-12T18:47:35.123514003Z" level=info msg="TearDown network for sandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" successfully" Apr 12 18:47:35.129167 env[1149]: time="2024-04-12T18:47:35.129112977Z" level=info msg="RemovePodSandbox \"4bc5889df3b682cd6c2d8979b086bed149a1df13fef19b93d2874d093901d890\" returns successfully" Apr 12 18:47:35.129894 env[1149]: time="2024-04-12T18:47:35.129847109Z" level=info msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.178 [WARNING][3389] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-csi--node--driver--lgcz9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6b6983f-32b2-47cf-9d27-0eda23916877", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b", Pod:"csi-node-driver-lgcz9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicd93277b2d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.179 [INFO][3389] k8s.go 585: Cleaning up netns ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.179 [INFO][3389] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" iface="eth0" netns="" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.179 [INFO][3389] k8s.go 592: Releasing IP address(es) ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.180 [INFO][3389] utils.go 188: Calico CNI releasing IP address ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.203 [INFO][3396] ipam_plugin.go 415: Releasing address using handleID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.204 [INFO][3396] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.204 [INFO][3396] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.213 [WARNING][3396] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.213 [INFO][3396] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.215 [INFO][3396] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:35.217536 env[1149]: 2024-04-12 18:47:35.216 [INFO][3389] k8s.go 598: Teardown processing complete. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.218515 env[1149]: time="2024-04-12T18:47:35.217534505Z" level=info msg="TearDown network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" successfully" Apr 12 18:47:35.218515 env[1149]: time="2024-04-12T18:47:35.217581410Z" level=info msg="StopPodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" returns successfully" Apr 12 18:47:35.219213 env[1149]: time="2024-04-12T18:47:35.219158585Z" level=info msg="RemovePodSandbox for \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" Apr 12 18:47:35.219386 env[1149]: time="2024-04-12T18:47:35.219215690Z" level=info msg="Forcibly stopping sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\"" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.264 [WARNING][3414] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.4-k8s-csi--node--driver--lgcz9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6b6983f-32b2-47cf-9d27-0eda23916877", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.4", ContainerID:"9d5c7870a46b85c4e17acb2d80a6aa211a2e47d6f91e18cf440b07b29eec1b3b", Pod:"csi-node-driver-lgcz9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicd93277b2d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.264 [INFO][3414] k8s.go 585: Cleaning up netns ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.264 [INFO][3414] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" iface="eth0" netns="" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.264 [INFO][3414] k8s.go 592: Releasing IP address(es) ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.264 [INFO][3414] utils.go 188: Calico CNI releasing IP address ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.289 [INFO][3420] ipam_plugin.go 415: Releasing address using handleID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.289 [INFO][3420] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.289 [INFO][3420] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.299 [WARNING][3420] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.299 [INFO][3420] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" HandleID="k8s-pod-network.a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Workload="10.128.0.4-k8s-csi--node--driver--lgcz9-eth0" Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.301 [INFO][3420] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:35.303782 env[1149]: 2024-04-12 18:47:35.302 [INFO][3414] k8s.go 598: Teardown processing complete. ContainerID="a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b" Apr 12 18:47:35.304677 env[1149]: time="2024-04-12T18:47:35.303793744Z" level=info msg="TearDown network for sandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" successfully" Apr 12 18:47:35.309238 env[1149]: time="2024-04-12T18:47:35.309163925Z" level=info msg="RemovePodSandbox \"a49125424f733edbba0c7d1482963e878a8b436cf26eafffea7e448aead95a8b\" returns successfully" Apr 12 18:47:35.346949 kubelet[1533]: I0412 18:47:35.346894 1533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59b7bc967d-g8d68" podStartSLOduration=2.842071572 podCreationTimestamp="2024-04-12 18:47:30 +0000 UTC" firstStartedPulling="2024-04-12 18:47:31.678431567 +0000 UTC m=+57.402974043" lastFinishedPulling="2024-04-12 18:47:34.183184406 +0000 UTC m=+59.907726879" observedRunningTime="2024-04-12 18:47:35.343363023 +0000 UTC m=+61.067905507" watchObservedRunningTime="2024-04-12 18:47:35.346824408 +0000 UTC m=+61.071366886" Apr 12 18:47:35.361000 audit[3427]: NETFILTER_CFG table=filter:90 family=2 entries=10 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:35.361000 audit[3427]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcf31da520 a2=0 a3=7ffcf31da50c items=0 ppid=1729 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:35.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:35.363000 audit[3427]: NETFILTER_CFG table=nat:91 family=2 entries=44 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:35.363000 audit[3427]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffcf31da520 a2=0 a3=7ffcf31da50c items=0 ppid=1729 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:35.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:35.852771 kubelet[1533]: E0412 18:47:35.852708 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:36.853102 kubelet[1533]: E0412 18:47:36.853035 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:37.853904 kubelet[1533]: E0412 18:47:37.853829 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:38.854614 kubelet[1533]: E0412 18:47:38.854553 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:39.855616 kubelet[1533]: E0412 18:47:39.855544 1533 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"