Jul 2 07:57:44.090059 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:57:44.090096 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:44.090112 kernel: BIOS-provided physical RAM map: Jul 2 07:57:44.090124 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 07:57:44.090134 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 07:57:44.090145 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 07:57:44.090162 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Jul 2 07:57:44.090174 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Jul 2 07:57:44.090185 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Jul 2 07:57:44.090197 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 07:57:44.090208 kernel: NX (Execute Disable) protection: active Jul 2 07:57:44.090219 kernel: SMBIOS 2.7 present. Jul 2 07:57:44.090231 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Jul 2 07:57:44.090243 kernel: Hypervisor detected: KVM Jul 2 07:57:44.090260 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:57:44.090273 kernel: kvm-clock: cpu 0, msr 3a192001, primary cpu clock Jul 2 07:57:44.090285 kernel: kvm-clock: using sched offset of 7165593605 cycles Jul 2 07:57:44.090298 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:57:44.090310 kernel: tsc: Detected 2499.998 MHz processor Jul 2 07:57:44.090323 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:57:44.090340 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:57:44.090353 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Jul 2 07:57:44.090366 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:57:44.090380 kernel: Using GB pages for direct mapping Jul 2 07:57:44.090394 kernel: ACPI: Early table checksum verification disabled Jul 2 07:57:44.090407 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Jul 2 07:57:44.090420 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Jul 2 07:57:44.090433 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Jul 2 07:57:44.090446 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Jul 2 07:57:44.090462 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Jul 2 07:57:44.090475 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jul 2 07:57:44.090487 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jul 2 07:57:44.090500 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Jul 2 07:57:44.090514 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jul 2 07:57:44.090527 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Jul 2 07:57:44.090540 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Jul 2 07:57:44.090553 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jul 2 07:57:44.090647 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Jul 2 07:57:44.090660 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Jul 2 07:57:44.090671 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Jul 2 07:57:44.090688 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Jul 2 07:57:44.090762 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Jul 2 07:57:44.090776 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Jul 2 07:57:44.090790 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Jul 2 07:57:44.090853 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Jul 2 07:57:44.090867 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Jul 2 07:57:44.090880 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Jul 2 07:57:44.090938 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:57:44.090951 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:57:44.090965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Jul 2 07:57:44.091022 kernel: NUMA: Initialized distance table, cnt=1 Jul 2 07:57:44.091037 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Jul 2 07:57:44.091053 kernel: Zone ranges: Jul 2 07:57:44.091110 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:57:44.091125 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Jul 2 07:57:44.091138 kernel: Normal empty Jul 2 07:57:44.091194 kernel: Movable zone start for each node Jul 2 07:57:44.091209 kernel: Early memory node ranges Jul 2 07:57:44.091222 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 07:57:44.091276 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Jul 2 07:57:44.091293 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Jul 2 07:57:44.091310 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:57:44.091368 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 07:57:44.091384 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Jul 2 07:57:44.091398 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:57:44.091412 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:57:44.091426 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Jul 2 07:57:44.091481 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:57:44.091495 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:57:44.091508 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:57:44.091525 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:57:44.091539 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:57:44.091552 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:57:44.091567 kernel: TSC deadline timer available Jul 2 07:57:44.091642 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:57:44.091656 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Jul 2 07:57:44.091769 kernel: Booting paravirtualized kernel on KVM Jul 2 07:57:44.091784 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:57:44.091797 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:57:44.091858 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:57:44.091873 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:57:44.091886 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:57:44.091899 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Jul 2 07:57:44.091913 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:57:44.091926 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:57:44.091940 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Jul 2 07:57:44.091954 kernel: Policy zone: DMA32 Jul 2 07:57:44.091969 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:44.091987 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:57:44.092000 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:57:44.092014 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:57:44.092027 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:57:44.092042 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123080K reserved, 0K cma-reserved) Jul 2 07:57:44.092056 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:57:44.092069 kernel: Kernel/User page tables isolation: enabled Jul 2 07:57:44.092083 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:57:44.092099 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:57:44.092113 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:57:44.092127 kernel: rcu: RCU event tracing is enabled. Jul 2 07:57:44.092141 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:57:44.092155 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:57:44.092168 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:57:44.092182 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:57:44.092196 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:57:44.092209 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:57:44.092223 kernel: random: crng init done Jul 2 07:57:44.092247 kernel: Console: colour VGA+ 80x25 Jul 2 07:57:44.092260 kernel: printk: console [ttyS0] enabled Jul 2 07:57:44.092289 kernel: ACPI: Core revision 20210730 Jul 2 07:57:44.092301 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Jul 2 07:57:44.092314 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:57:44.092327 kernel: x2apic enabled Jul 2 07:57:44.092340 kernel: Switched APIC routing to physical x2apic. Jul 2 07:57:44.092354 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 2 07:57:44.092368 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Jul 2 07:57:44.092385 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 07:57:44.092482 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 07:57:44.092497 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:57:44.092522 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:57:44.092539 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:57:44.092554 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:57:44.092569 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jul 2 07:57:44.092584 kernel: RETBleed: Vulnerable Jul 2 07:57:44.092599 kernel: Speculative Store Bypass: Vulnerable Jul 2 07:57:44.092613 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:57:44.092646 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:57:44.092658 kernel: GDS: Unknown: Dependent on hypervisor status Jul 2 07:57:44.092669 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:57:44.092684 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:57:44.092697 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:57:44.092999 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jul 2 07:57:44.093012 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jul 2 07:57:44.093024 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 2 07:57:44.093035 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 2 07:57:44.093052 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 2 07:57:44.093064 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Jul 2 07:57:44.093078 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:57:44.093090 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jul 2 07:57:44.093179 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jul 2 07:57:44.093193 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Jul 2 07:57:44.093207 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Jul 2 07:57:44.093220 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Jul 2 07:57:44.093234 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Jul 2 07:57:44.093249 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Jul 2 07:57:44.093262 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:57:44.093280 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:57:44.093293 kernel: LSM: Security Framework initializing Jul 2 07:57:44.093307 kernel: SELinux: Initializing. Jul 2 07:57:44.093333 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:57:44.093346 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:57:44.093359 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8175M CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x4) Jul 2 07:57:44.093371 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 2 07:57:44.093386 kernel: signal: max sigframe size: 3632 Jul 2 07:57:44.093399 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:57:44.093411 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:57:44.093424 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:57:44.093496 kernel: x86: Booting SMP configuration: Jul 2 07:57:44.093511 kernel: .... node #0, CPUs: #1 Jul 2 07:57:44.093524 kernel: kvm-clock: cpu 1, msr 3a192041, secondary cpu clock Jul 2 07:57:44.093538 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Jul 2 07:57:44.093552 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:57:44.093567 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:57:44.093580 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:57:44.093593 kernel: smpboot: Max logical packages: 1 Jul 2 07:57:44.093611 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Jul 2 07:57:44.093658 kernel: devtmpfs: initialized Jul 2 07:57:44.093670 kernel: x86/mm: Memory block size: 128MB Jul 2 07:57:44.093683 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:57:44.093697 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:57:44.093709 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:57:44.093722 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:57:44.093734 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:57:44.093746 kernel: audit: type=2000 audit(1719907062.498:1): state=initialized audit_enabled=0 res=1 Jul 2 07:57:44.093761 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:57:44.093773 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:57:44.093785 kernel: cpuidle: using governor menu Jul 2 07:57:44.093796 kernel: ACPI: bus type PCI registered Jul 2 07:57:44.093808 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:57:44.093820 kernel: dca service started, version 1.12.1 Jul 2 07:57:44.093832 kernel: PCI: Using configuration type 1 for base access Jul 2 07:57:44.093845 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:57:44.093857 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:57:44.093872 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:57:44.093884 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:57:44.093896 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:57:44.093908 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:57:44.093920 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:57:44.093932 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:57:44.093945 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:57:44.093957 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:57:44.093970 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:57:44.093985 kernel: ACPI: Interpreter enabled Jul 2 07:57:44.093997 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:57:44.094009 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:57:44.094023 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:57:44.094037 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:57:44.094048 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:57:44.094232 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:57:44.094354 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:57:44.094438 kernel: acpiphp: Slot [3] registered Jul 2 07:57:44.094454 kernel: acpiphp: Slot [4] registered Jul 2 07:57:44.094469 kernel: acpiphp: Slot [5] registered Jul 2 07:57:44.094483 kernel: acpiphp: Slot [6] registered Jul 2 07:57:44.094498 kernel: acpiphp: Slot [7] registered Jul 2 07:57:44.094512 kernel: acpiphp: Slot [8] registered Jul 2 07:57:44.094527 kernel: acpiphp: Slot [9] registered Jul 2 07:57:44.094542 kernel: acpiphp: Slot [10] registered Jul 2 07:57:44.094556 kernel: acpiphp: Slot [11] registered Jul 2 07:57:44.094573 kernel: acpiphp: Slot [12] registered Jul 2 07:57:44.094587 kernel: acpiphp: Slot [13] registered Jul 2 07:57:44.094602 kernel: acpiphp: Slot [14] registered Jul 2 07:57:44.094616 kernel: acpiphp: Slot [15] registered Jul 2 07:57:44.094649 kernel: acpiphp: Slot [16] registered Jul 2 07:57:44.094714 kernel: acpiphp: Slot [17] registered Jul 2 07:57:44.094730 kernel: acpiphp: Slot [18] registered Jul 2 07:57:44.094744 kernel: acpiphp: Slot [19] registered Jul 2 07:57:44.094756 kernel: acpiphp: Slot [20] registered Jul 2 07:57:44.094769 kernel: acpiphp: Slot [21] registered Jul 2 07:57:44.094786 kernel: acpiphp: Slot [22] registered Jul 2 07:57:44.094801 kernel: acpiphp: Slot [23] registered Jul 2 07:57:44.094815 kernel: acpiphp: Slot [24] registered Jul 2 07:57:44.094829 kernel: acpiphp: Slot [25] registered Jul 2 07:57:44.094843 kernel: acpiphp: Slot [26] registered Jul 2 07:57:44.094857 kernel: acpiphp: Slot [27] registered Jul 2 07:57:44.094871 kernel: acpiphp: Slot [28] registered Jul 2 07:57:44.094885 kernel: acpiphp: Slot [29] registered Jul 2 07:57:44.094898 kernel: acpiphp: Slot [30] registered Jul 2 07:57:44.094915 kernel: acpiphp: Slot [31] registered Jul 2 07:57:44.094929 kernel: PCI host bridge to bus 0000:00 Jul 2 07:57:44.095075 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:57:44.095189 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:57:44.095301 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:57:44.095410 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 07:57:44.095658 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:57:44.095956 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:57:44.096099 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:57:44.096247 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Jul 2 07:57:44.096451 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:57:44.096669 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Jul 2 07:57:44.096899 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Jul 2 07:57:44.097176 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Jul 2 07:57:44.097318 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Jul 2 07:57:44.097458 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Jul 2 07:57:44.097582 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Jul 2 07:57:44.097725 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Jul 2 07:57:44.097860 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Jul 2 07:57:44.098000 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Jul 2 07:57:44.098213 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Jul 2 07:57:44.098355 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:57:44.098500 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jul 2 07:57:44.098656 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Jul 2 07:57:44.098796 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jul 2 07:57:44.098933 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Jul 2 07:57:44.098954 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:57:44.098975 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:57:44.098992 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:57:44.099008 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:57:44.099025 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:57:44.099041 kernel: iommu: Default domain type: Translated Jul 2 07:57:44.099057 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:57:44.099297 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Jul 2 07:57:44.099439 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:57:44.099555 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Jul 2 07:57:44.099578 kernel: vgaarb: loaded Jul 2 07:57:44.099592 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:57:44.099604 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:57:44.099616 kernel: PTP clock support registered Jul 2 07:57:44.099646 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:57:44.099658 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:57:44.099671 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 07:57:44.099684 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Jul 2 07:57:44.099695 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Jul 2 07:57:44.099712 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Jul 2 07:57:44.099726 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:57:44.099741 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:57:44.099755 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:57:44.099770 kernel: pnp: PnP ACPI init Jul 2 07:57:44.099784 kernel: pnp: PnP ACPI: found 5 devices Jul 2 07:57:44.099799 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:57:44.099813 kernel: NET: Registered PF_INET protocol family Jul 2 07:57:44.099828 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:57:44.099846 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 07:57:44.099860 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:57:44.099875 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:57:44.099889 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 07:57:44.099903 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 07:57:44.099917 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:57:44.099932 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:57:44.099947 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:57:44.099964 kernel: NET: Registered PF_XDP protocol family Jul 2 07:57:44.100084 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:57:44.100196 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:57:44.100333 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:57:44.100446 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 07:57:44.100579 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:57:44.100724 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:57:44.100744 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:57:44.100764 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:57:44.100780 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 2 07:57:44.100795 kernel: clocksource: Switched to clocksource tsc Jul 2 07:57:44.100811 kernel: Initialise system trusted keyrings Jul 2 07:57:44.100826 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 07:57:44.100841 kernel: Key type asymmetric registered Jul 2 07:57:44.100855 kernel: Asymmetric key parser 'x509' registered Jul 2 07:57:44.100870 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:57:44.100884 kernel: io scheduler mq-deadline registered Jul 2 07:57:44.100903 kernel: io scheduler kyber registered Jul 2 07:57:44.100918 kernel: io scheduler bfq registered Jul 2 07:57:44.100933 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:57:44.100949 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:57:44.100964 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:57:44.100980 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:57:44.100995 kernel: i8042: Warning: Keylock active Jul 2 07:57:44.101010 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:57:44.101025 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:57:44.101305 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:57:44.101439 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:57:44.101614 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:57:43 UTC (1719907063) Jul 2 07:57:44.101769 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:57:44.101789 kernel: intel_pstate: CPU model not supported Jul 2 07:57:44.101806 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:57:44.101820 kernel: Segment Routing with IPv6 Jul 2 07:57:44.101840 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:57:44.101855 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:57:44.101869 kernel: Key type dns_resolver registered Jul 2 07:57:44.101884 kernel: IPI shorthand broadcast: enabled Jul 2 07:57:44.101899 kernel: sched_clock: Marking stable (439736448, 283908541)->(861464516, -137819527) Jul 2 07:57:44.101914 kernel: registered taskstats version 1 Jul 2 07:57:44.101929 kernel: Loading compiled-in X.509 certificates Jul 2 07:57:44.101944 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:57:44.101958 kernel: Key type .fscrypt registered Jul 2 07:57:44.101972 kernel: Key type fscrypt-provisioning registered Jul 2 07:57:44.101989 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:57:44.102004 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:57:44.102018 kernel: ima: No architecture policies found Jul 2 07:57:44.102033 kernel: clk: Disabling unused clocks Jul 2 07:57:44.102048 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:57:44.102063 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:57:44.102078 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:57:44.102092 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:57:44.102110 kernel: Run /init as init process Jul 2 07:57:44.102125 kernel: with arguments: Jul 2 07:57:44.102139 kernel: /init Jul 2 07:57:44.102154 kernel: with environment: Jul 2 07:57:44.102168 kernel: HOME=/ Jul 2 07:57:44.102182 kernel: TERM=linux Jul 2 07:57:44.102196 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:57:44.102214 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:57:44.102235 systemd[1]: Detected virtualization amazon. Jul 2 07:57:44.102252 systemd[1]: Detected architecture x86-64. Jul 2 07:57:44.102267 systemd[1]: Running in initrd. Jul 2 07:57:44.102282 systemd[1]: No hostname configured, using default hostname. Jul 2 07:57:44.102374 systemd[1]: Hostname set to . Jul 2 07:57:44.102394 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:57:44.102413 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:57:44.102429 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:57:44.102445 systemd[1]: Reached target cryptsetup.target. Jul 2 07:57:44.102461 systemd[1]: Reached target paths.target. Jul 2 07:57:44.102561 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:57:44.102579 systemd[1]: Reached target slices.target. Jul 2 07:57:44.102595 systemd[1]: Reached target swap.target. Jul 2 07:57:44.102699 systemd[1]: Reached target timers.target. Jul 2 07:57:44.102720 systemd[1]: Listening on iscsid.socket. Jul 2 07:57:44.102736 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:57:44.102752 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:57:44.102769 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:57:44.102785 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:57:44.102801 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:57:44.102873 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:57:44.102891 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:57:44.102911 systemd[1]: Reached target sockets.target. Jul 2 07:57:44.102927 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:57:44.102942 systemd[1]: Finished network-cleanup.service. Jul 2 07:57:44.102958 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:57:44.102974 systemd[1]: Starting systemd-journald.service... Jul 2 07:57:44.102990 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:57:44.103006 systemd[1]: Starting systemd-resolved.service... Jul 2 07:57:44.103022 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:57:44.103044 systemd-journald[185]: Journal started Jul 2 07:57:44.103121 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2d1328b6005cdfc05ef401d46d663c) is 4.8M, max 38.7M, 33.9M free. Jul 2 07:57:44.118970 systemd[1]: Started systemd-journald.service. Jul 2 07:57:44.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.119654 kernel: audit: type=1130 audit(1719907064.118:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.123847 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:57:44.315055 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:57:44.315088 kernel: Bridge firewalling registered Jul 2 07:57:44.315106 kernel: SCSI subsystem initialized Jul 2 07:57:44.131228 systemd-modules-load[186]: Inserted module 'overlay' Jul 2 07:57:44.212616 systemd-resolved[187]: Positive Trust Anchors: Jul 2 07:57:44.351128 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:57:44.351182 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:57:44.351205 kernel: audit: type=1130 audit(1719907064.322:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.351231 kernel: audit: type=1130 audit(1719907064.323:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.351256 kernel: audit: type=1130 audit(1719907064.325:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.351278 kernel: audit: type=1130 audit(1719907064.325:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.351299 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:57:44.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.212646 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:57:44.212703 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:57:44.230262 systemd-resolved[187]: Defaulting to hostname 'linux'. Jul 2 07:57:44.253146 systemd-modules-load[186]: Inserted module 'br_netfilter' Jul 2 07:57:44.323543 systemd[1]: Started systemd-resolved.service. Jul 2 07:57:44.325397 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:57:44.326218 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:57:44.333065 systemd[1]: Reached target nss-lookup.target. Jul 2 07:57:44.376575 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:57:44.378834 systemd-modules-load[186]: Inserted module 'dm_multipath' Jul 2 07:57:44.386928 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:57:44.388437 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:57:44.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.394640 kernel: audit: type=1130 audit(1719907064.388:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.397273 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:57:44.413199 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:57:44.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.418689 kernel: audit: type=1130 audit(1719907064.413:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.420817 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:57:44.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.426650 kernel: audit: type=1130 audit(1719907064.421:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.435801 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:57:44.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.440357 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:57:44.446415 kernel: audit: type=1130 audit(1719907064.437:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.456778 dracut-cmdline[206]: dracut-dracut-053 Jul 2 07:57:44.460903 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:44.568651 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:57:44.590688 kernel: iscsi: registered transport (tcp) Jul 2 07:57:44.618076 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:57:44.618155 kernel: QLogic iSCSI HBA Driver Jul 2 07:57:44.655391 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:57:44.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:44.660279 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:57:44.717666 kernel: raid6: avx512x4 gen() 15437 MB/s Jul 2 07:57:44.735658 kernel: raid6: avx512x4 xor() 7038 MB/s Jul 2 07:57:44.753663 kernel: raid6: avx512x2 gen() 15754 MB/s Jul 2 07:57:44.771658 kernel: raid6: avx512x2 xor() 21392 MB/s Jul 2 07:57:44.789681 kernel: raid6: avx512x1 gen() 14206 MB/s Jul 2 07:57:44.807670 kernel: raid6: avx512x1 xor() 12708 MB/s Jul 2 07:57:44.826661 kernel: raid6: avx2x4 gen() 13179 MB/s Jul 2 07:57:44.844666 kernel: raid6: avx2x4 xor() 4231 MB/s Jul 2 07:57:44.862657 kernel: raid6: avx2x2 gen() 14474 MB/s Jul 2 07:57:44.880660 kernel: raid6: avx2x2 xor() 14153 MB/s Jul 2 07:57:44.897662 kernel: raid6: avx2x1 gen() 11985 MB/s Jul 2 07:57:44.915709 kernel: raid6: avx2x1 xor() 13326 MB/s Jul 2 07:57:44.933661 kernel: raid6: sse2x4 gen() 8566 MB/s Jul 2 07:57:44.951655 kernel: raid6: sse2x4 xor() 5007 MB/s Jul 2 07:57:44.969664 kernel: raid6: sse2x2 gen() 8166 MB/s Jul 2 07:57:44.987655 kernel: raid6: sse2x2 xor() 5495 MB/s Jul 2 07:57:45.005659 kernel: raid6: sse2x1 gen() 8437 MB/s Jul 2 07:57:45.024282 kernel: raid6: sse2x1 xor() 3992 MB/s Jul 2 07:57:45.024374 kernel: raid6: using algorithm avx512x2 gen() 15754 MB/s Jul 2 07:57:45.024399 kernel: raid6: .... xor() 21392 MB/s, rmw enabled Jul 2 07:57:45.025466 kernel: raid6: using avx512x2 recovery algorithm Jul 2 07:57:45.044664 kernel: xor: automatically using best checksumming function avx Jul 2 07:57:45.178655 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:57:45.190255 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:57:45.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.191000 audit: BPF prog-id=7 op=LOAD Jul 2 07:57:45.191000 audit: BPF prog-id=8 op=LOAD Jul 2 07:57:45.194231 systemd[1]: Starting systemd-udevd.service... Jul 2 07:57:45.230306 systemd-udevd[384]: Using default interface naming scheme 'v252'. Jul 2 07:57:45.250382 systemd[1]: Started systemd-udevd.service. Jul 2 07:57:45.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.257616 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:57:45.287718 dracut-pre-trigger[391]: rd.md=0: removing MD RAID activation Jul 2 07:57:45.333028 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:57:45.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.334480 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:57:45.403069 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:57:45.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.458808 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:57:45.484648 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:57:45.484723 kernel: AES CTR mode by8 optimization enabled Jul 2 07:57:45.508644 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jul 2 07:57:45.508995 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jul 2 07:57:45.510652 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Jul 2 07:57:45.513647 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:1d:12:7c:6c:91 Jul 2 07:57:45.515863 (udev-worker)[430]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:57:45.706056 kernel: nvme nvme0: pci function 0000:00:04.0 Jul 2 07:57:45.706305 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 07:57:45.706326 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jul 2 07:57:45.706469 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:57:45.706491 kernel: GPT:9289727 != 16777215 Jul 2 07:57:45.706511 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:57:45.706531 kernel: GPT:9289727 != 16777215 Jul 2 07:57:45.706550 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:57:45.706571 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:57:45.706588 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (441) Jul 2 07:57:45.636957 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:57:45.718596 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:57:45.755526 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:57:45.757012 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:57:45.769115 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:57:45.773159 systemd[1]: Starting disk-uuid.service... Jul 2 07:57:45.780655 disk-uuid[593]: Primary Header is updated. Jul 2 07:57:45.780655 disk-uuid[593]: Secondary Entries is updated. Jul 2 07:57:45.780655 disk-uuid[593]: Secondary Header is updated. Jul 2 07:57:45.787639 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:57:45.813095 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:57:46.819944 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 07:57:46.820814 disk-uuid[594]: The operation has completed successfully. Jul 2 07:57:46.983489 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:57:46.983639 systemd[1]: Finished disk-uuid.service. Jul 2 07:57:46.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.987235 systemd[1]: Starting verity-setup.service... Jul 2 07:57:47.014648 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:57:47.118099 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:57:47.122195 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:57:47.126172 systemd[1]: Finished verity-setup.service. Jul 2 07:57:47.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.222648 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:57:47.224304 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:57:47.224891 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:57:47.226188 systemd[1]: Starting ignition-setup.service... Jul 2 07:57:47.242804 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:57:47.276697 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:47.276774 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:57:47.276796 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:57:47.295652 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:57:47.310679 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:57:47.332379 systemd[1]: Finished ignition-setup.service. Jul 2 07:57:47.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.334551 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:57:47.355854 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:57:47.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.358000 audit: BPF prog-id=9 op=LOAD Jul 2 07:57:47.359986 systemd[1]: Starting systemd-networkd.service... Jul 2 07:57:47.401115 systemd-networkd[1022]: lo: Link UP Jul 2 07:57:47.401130 systemd-networkd[1022]: lo: Gained carrier Jul 2 07:57:47.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.402562 systemd-networkd[1022]: Enumeration completed Jul 2 07:57:47.402752 systemd[1]: Started systemd-networkd.service. Jul 2 07:57:47.403298 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:57:47.406169 systemd[1]: Reached target network.target. Jul 2 07:57:47.410774 systemd[1]: Starting iscsiuio.service... Jul 2 07:57:47.419167 systemd[1]: Started iscsiuio.service. Jul 2 07:57:47.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.419766 systemd-networkd[1022]: eth0: Link UP Jul 2 07:57:47.419773 systemd-networkd[1022]: eth0: Gained carrier Jul 2 07:57:47.427212 iscsid[1027]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:57:47.427212 iscsid[1027]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:57:47.427212 iscsid[1027]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:57:47.427212 iscsid[1027]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:57:47.427212 iscsid[1027]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:57:47.427212 iscsid[1027]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:57:47.427212 iscsid[1027]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:57:47.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.421535 systemd[1]: Starting iscsid.service... Jul 2 07:57:47.429288 systemd[1]: Started iscsid.service. Jul 2 07:57:47.443427 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:57:47.449293 systemd-networkd[1022]: eth0: DHCPv4 address 172.31.22.164/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 07:57:47.462460 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:57:47.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.462747 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:57:47.469425 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:57:47.471834 systemd[1]: Reached target remote-fs.target. Jul 2 07:57:47.479202 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:57:47.490806 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:57:47.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.038052 ignition[1014]: Ignition 2.14.0 Jul 2 07:57:48.038068 ignition[1014]: Stage: fetch-offline Jul 2 07:57:48.038204 ignition[1014]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.038315 ignition[1014]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.059059 ignition[1014]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.061297 ignition[1014]: Ignition finished successfully Jul 2 07:57:48.062772 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:57:48.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.065775 systemd[1]: Starting ignition-fetch.service... Jul 2 07:57:48.092006 ignition[1046]: Ignition 2.14.0 Jul 2 07:57:48.092021 ignition[1046]: Stage: fetch Jul 2 07:57:48.092229 ignition[1046]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.092262 ignition[1046]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.112380 ignition[1046]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.114359 ignition[1046]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.124436 ignition[1046]: INFO : PUT result: OK Jul 2 07:57:48.128781 ignition[1046]: DEBUG : parsed url from cmdline: "" Jul 2 07:57:48.130201 ignition[1046]: INFO : no config URL provided Jul 2 07:57:48.130201 ignition[1046]: INFO : reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:57:48.130201 ignition[1046]: INFO : no config at "/usr/lib/ignition/user.ign" Jul 2 07:57:48.130201 ignition[1046]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.137462 ignition[1046]: INFO : PUT result: OK Jul 2 07:57:48.137462 ignition[1046]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jul 2 07:57:48.140282 ignition[1046]: INFO : GET result: OK Jul 2 07:57:48.140282 ignition[1046]: DEBUG : parsing config with SHA512: e7507416a3e4b075bf6e4129075d3fc0a5c29924bb47fda648d6edfd0d97a2f9dd316697ad70572d6f82289a5fa0e2167de1cc1088222e59885f739f463be8dd Jul 2 07:57:48.148019 unknown[1046]: fetched base config from "system" Jul 2 07:57:48.148101 unknown[1046]: fetched base config from "system" Jul 2 07:57:48.148119 unknown[1046]: fetched user config from "aws" Jul 2 07:57:48.155661 ignition[1046]: fetch: fetch complete Jul 2 07:57:48.155677 ignition[1046]: fetch: fetch passed Jul 2 07:57:48.155765 ignition[1046]: Ignition finished successfully Jul 2 07:57:48.165907 systemd[1]: Finished ignition-fetch.service. Jul 2 07:57:48.167455 systemd[1]: Starting ignition-kargs.service... Jul 2 07:57:48.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.170367 kernel: kauditd_printk_skb: 19 callbacks suppressed Jul 2 07:57:48.170411 kernel: audit: type=1130 audit(1719907068.165:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.185112 ignition[1052]: Ignition 2.14.0 Jul 2 07:57:48.185123 ignition[1052]: Stage: kargs Jul 2 07:57:48.185270 ignition[1052]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.185289 ignition[1052]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.192679 ignition[1052]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.195339 ignition[1052]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.198332 ignition[1052]: INFO : PUT result: OK Jul 2 07:57:48.203793 ignition[1052]: kargs: kargs passed Jul 2 07:57:48.203869 ignition[1052]: Ignition finished successfully Jul 2 07:57:48.209535 systemd[1]: Finished ignition-kargs.service. Jul 2 07:57:48.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.218885 systemd[1]: Starting ignition-disks.service... Jul 2 07:57:48.247803 kernel: audit: type=1130 audit(1719907068.216:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.258736 ignition[1058]: Ignition 2.14.0 Jul 2 07:57:48.258750 ignition[1058]: Stage: disks Jul 2 07:57:48.258952 ignition[1058]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.258985 ignition[1058]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.278204 ignition[1058]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.279852 ignition[1058]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.282863 ignition[1058]: INFO : PUT result: OK Jul 2 07:57:48.288052 ignition[1058]: disks: disks passed Jul 2 07:57:48.288124 ignition[1058]: Ignition finished successfully Jul 2 07:57:48.289985 systemd[1]: Finished ignition-disks.service. Jul 2 07:57:48.299879 kernel: audit: type=1130 audit(1719907068.292:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.292762 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:57:48.300075 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:57:48.305065 systemd[1]: Reached target local-fs.target. Jul 2 07:57:48.307680 systemd[1]: Reached target sysinit.target. Jul 2 07:57:48.311396 systemd[1]: Reached target basic.target. Jul 2 07:57:48.319878 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:57:48.406672 systemd-fsck[1066]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:57:48.411775 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:57:48.435818 kernel: audit: type=1130 audit(1719907068.412:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.417798 systemd[1]: Mounting sysroot.mount... Jul 2 07:57:48.456428 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:57:48.458497 systemd[1]: Mounted sysroot.mount. Jul 2 07:57:48.461925 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:57:48.480470 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:57:48.482065 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:57:48.482131 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:57:48.482169 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:57:48.495142 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:57:48.512515 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:57:48.517843 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:57:48.534649 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1083) Jul 2 07:57:48.538088 initrd-setup-root[1088]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:57:48.544516 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:48.544556 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:57:48.544573 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:57:48.549689 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:57:48.552811 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:57:48.558587 initrd-setup-root[1114]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:57:48.565453 initrd-setup-root[1122]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:57:48.571943 initrd-setup-root[1130]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:57:48.582836 systemd-networkd[1022]: eth0: Gained IPv6LL Jul 2 07:57:48.802592 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:57:48.814064 kernel: audit: type=1130 audit(1719907068.804:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.806073 systemd[1]: Starting ignition-mount.service... Jul 2 07:57:48.816686 systemd[1]: Starting sysroot-boot.service... Jul 2 07:57:48.827267 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:48.827398 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:48.858766 ignition[1149]: INFO : Ignition 2.14.0 Jul 2 07:57:48.858766 ignition[1149]: INFO : Stage: mount Jul 2 07:57:48.861362 ignition[1149]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.861362 ignition[1149]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.868866 systemd[1]: Finished sysroot-boot.service. Jul 2 07:57:48.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.876654 kernel: audit: type=1130 audit(1719907068.870:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.887905 ignition[1149]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.889958 ignition[1149]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.892468 ignition[1149]: INFO : PUT result: OK Jul 2 07:57:48.896319 ignition[1149]: INFO : mount: mount passed Jul 2 07:57:48.898256 ignition[1149]: INFO : Ignition finished successfully Jul 2 07:57:48.901130 systemd[1]: Finished ignition-mount.service. Jul 2 07:57:48.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.905108 systemd[1]: Starting ignition-files.service... Jul 2 07:57:48.911859 kernel: audit: type=1130 audit(1719907068.903:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.918489 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:57:48.935644 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1158) Jul 2 07:57:48.939081 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:48.939139 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 07:57:48.939159 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 07:57:48.947654 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 07:57:48.950708 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:57:48.968396 ignition[1177]: INFO : Ignition 2.14.0 Jul 2 07:57:48.968396 ignition[1177]: INFO : Stage: files Jul 2 07:57:48.971511 ignition[1177]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:48.971511 ignition[1177]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:48.981154 ignition[1177]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:48.983532 ignition[1177]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:48.986083 ignition[1177]: INFO : PUT result: OK Jul 2 07:57:48.992111 ignition[1177]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:57:48.998058 ignition[1177]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:57:48.998058 ignition[1177]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:57:49.004914 ignition[1177]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:57:49.007038 ignition[1177]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:57:49.009886 unknown[1177]: wrote ssh authorized keys file for user: core Jul 2 07:57:49.011685 ignition[1177]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:57:49.014018 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 07:57:49.016712 ignition[1177]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:49.028933 ignition[1177]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2523274755" Jul 2 07:57:49.033413 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1180) Jul 2 07:57:49.033449 ignition[1177]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2523274755": device or resource busy Jul 2 07:57:49.033449 ignition[1177]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2523274755", trying btrfs: device or resource busy Jul 2 07:57:49.033449 ignition[1177]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2523274755" Jul 2 07:57:49.033449 ignition[1177]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2523274755" Jul 2 07:57:49.051606 ignition[1177]: INFO : op(3): [started] unmounting "/mnt/oem2523274755" Jul 2 07:57:49.056278 ignition[1177]: INFO : op(3): [finished] unmounting "/mnt/oem2523274755" Jul 2 07:57:49.056278 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 07:57:49.056278 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:57:49.056278 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:57:49.075752 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:57:49.077976 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:57:49.077976 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:57:49.084265 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:57:49.084265 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 07:57:49.093643 ignition[1177]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:49.103565 ignition[1177]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705237983" Jul 2 07:57:49.105766 ignition[1177]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705237983": device or resource busy Jul 2 07:57:49.105766 ignition[1177]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2705237983", trying btrfs: device or resource busy Jul 2 07:57:49.105766 ignition[1177]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705237983" Jul 2 07:57:49.115064 ignition[1177]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705237983" Jul 2 07:57:49.115064 ignition[1177]: INFO : op(6): [started] unmounting "/mnt/oem2705237983" Jul 2 07:57:49.115064 ignition[1177]: INFO : op(6): [finished] unmounting "/mnt/oem2705237983" Jul 2 07:57:49.115064 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 07:57:49.115064 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 07:57:49.115064 ignition[1177]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:49.147815 ignition[1177]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem369965175" Jul 2 07:57:49.149789 ignition[1177]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem369965175": device or resource busy Jul 2 07:57:49.149789 ignition[1177]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem369965175", trying btrfs: device or resource busy Jul 2 07:57:49.149789 ignition[1177]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem369965175" Jul 2 07:57:49.149789 ignition[1177]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem369965175" Jul 2 07:57:49.161604 ignition[1177]: INFO : op(9): [started] unmounting "/mnt/oem369965175" Jul 2 07:57:49.161604 ignition[1177]: INFO : op(9): [finished] unmounting "/mnt/oem369965175" Jul 2 07:57:49.161604 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 07:57:49.161604 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:57:49.161604 ignition[1177]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:49.181597 ignition[1177]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688308485" Jul 2 07:57:49.183687 ignition[1177]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688308485": device or resource busy Jul 2 07:57:49.186139 ignition[1177]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1688308485", trying btrfs: device or resource busy Jul 2 07:57:49.186139 ignition[1177]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688308485" Jul 2 07:57:49.193507 ignition[1177]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1688308485" Jul 2 07:57:49.193507 ignition[1177]: INFO : op(c): [started] unmounting "/mnt/oem1688308485" Jul 2 07:57:49.193507 ignition[1177]: INFO : op(c): [finished] unmounting "/mnt/oem1688308485" Jul 2 07:57:49.199452 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 07:57:49.199452 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:57:49.199452 ignition[1177]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1 Jul 2 07:57:49.533125 ignition[1177]: INFO : GET result: OK Jul 2 07:57:49.950254 ignition[1177]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:57:49.950254 ignition[1177]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:57:49.950254 ignition[1177]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:57:49.950254 ignition[1177]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(e): [started] processing unit "nvidia.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(e): [finished] processing unit "nvidia.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Jul 2 07:57:49.960227 ignition[1177]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Jul 2 07:57:49.987181 ignition[1177]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:57:49.991720 ignition[1177]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:57:49.995281 ignition[1177]: INFO : files: files passed Jul 2 07:57:49.995281 ignition[1177]: INFO : Ignition finished successfully Jul 2 07:57:49.998308 systemd[1]: Finished ignition-files.service. Jul 2 07:57:50.006761 kernel: audit: type=1130 audit(1719907069.999:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:49.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.009087 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:57:50.012716 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:57:50.013916 systemd[1]: Starting ignition-quench.service... Jul 2 07:57:50.021148 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:57:50.022355 systemd[1]: Finished ignition-quench.service. Jul 2 07:57:50.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.029851 kernel: audit: type=1130 audit(1719907070.023:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.029918 kernel: audit: type=1131 audit(1719907070.023:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.035177 initrd-setup-root-after-ignition[1202]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:57:50.037530 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:57:50.040004 systemd[1]: Reached target ignition-complete.target. Jul 2 07:57:50.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.042773 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:57:50.059840 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:57:50.059977 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:57:50.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.062356 systemd[1]: Reached target initrd-fs.target. Jul 2 07:57:50.064224 systemd[1]: Reached target initrd.target. Jul 2 07:57:50.066105 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:57:50.068642 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:57:50.081767 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:57:50.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.085056 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:57:50.104578 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:57:50.105829 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:57:50.109593 systemd[1]: Stopped target timers.target. Jul 2 07:57:50.112571 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:57:50.113940 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:57:50.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.116068 systemd[1]: Stopped target initrd.target. Jul 2 07:57:50.118136 systemd[1]: Stopped target basic.target. Jul 2 07:57:50.120123 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:57:50.122712 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:57:50.125930 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:57:50.129772 systemd[1]: Stopped target remote-fs.target. Jul 2 07:57:50.132604 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:57:50.136337 systemd[1]: Stopped target sysinit.target. Jul 2 07:57:50.138877 systemd[1]: Stopped target local-fs.target. Jul 2 07:57:50.142026 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:57:50.144720 systemd[1]: Stopped target swap.target. Jul 2 07:57:50.146819 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:57:50.148125 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:57:50.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.150725 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:57:50.153259 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:57:50.153456 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:57:50.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.160111 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:57:50.163075 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:57:50.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.165686 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:57:50.167154 systemd[1]: Stopped ignition-files.service. Jul 2 07:57:50.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.170461 systemd[1]: Stopping ignition-mount.service... Jul 2 07:57:50.179069 iscsid[1027]: iscsid shutting down. Jul 2 07:57:50.180293 systemd[1]: Stopping iscsid.service... Jul 2 07:57:50.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.181193 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:57:50.181359 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:57:50.190387 ignition[1215]: INFO : Ignition 2.14.0 Jul 2 07:57:50.190387 ignition[1215]: INFO : Stage: umount Jul 2 07:57:50.190387 ignition[1215]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:50.190387 ignition[1215]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 07:57:50.196780 ignition[1215]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 07:57:50.196780 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 07:57:50.202816 ignition[1215]: INFO : PUT result: OK Jul 2 07:57:50.201219 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:57:50.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.209073 ignition[1215]: INFO : umount: umount passed Jul 2 07:57:50.209073 ignition[1215]: INFO : Ignition finished successfully Jul 2 07:57:50.202234 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:57:50.202454 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:57:50.208692 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:57:50.208872 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:57:50.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.228760 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:57:50.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.228956 systemd[1]: Stopped iscsid.service. Jul 2 07:57:50.233029 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:57:50.233233 systemd[1]: Stopped ignition-mount.service. Jul 2 07:57:50.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.240413 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:57:50.242964 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:57:50.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.243090 systemd[1]: Stopped ignition-disks.service. Jul 2 07:57:50.249325 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:57:50.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.249400 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:57:50.255064 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:57:50.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.255121 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:57:50.256848 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:57:50.256890 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:57:50.259822 systemd[1]: Stopped target paths.target. Jul 2 07:57:50.260827 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:57:50.265702 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:57:50.267360 systemd[1]: Stopped target slices.target. Jul 2 07:57:50.267506 systemd[1]: Stopped target sockets.target. Jul 2 07:57:50.270378 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:57:50.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.270423 systemd[1]: Closed iscsid.socket. Jul 2 07:57:50.272068 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:57:50.272120 systemd[1]: Stopped ignition-setup.service. Jul 2 07:57:50.274894 systemd[1]: Stopping iscsiuio.service... Jul 2 07:57:50.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.275899 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:57:50.275978 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:57:50.283297 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:57:50.283538 systemd[1]: Stopped iscsiuio.service. Jul 2 07:57:50.285942 systemd[1]: Stopped target network.target. Jul 2 07:57:50.290387 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:57:50.290439 systemd[1]: Closed iscsiuio.socket. Jul 2 07:57:50.292932 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:57:50.295928 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:57:50.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.297885 systemd-networkd[1022]: eth0: DHCPv6 lease lost Jul 2 07:57:50.301733 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:57:50.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.301837 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:57:50.308835 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:57:50.308949 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:57:50.316000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:57:50.316000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:57:50.317432 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:57:50.317491 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:57:50.321532 systemd[1]: Stopping network-cleanup.service... Jul 2 07:57:50.324739 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:57:50.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.325998 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:57:50.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.334431 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:57:50.334591 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:57:50.338382 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:57:50.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.339667 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:57:50.343318 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:57:50.354001 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:57:50.357419 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:57:50.357579 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:57:50.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.361404 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:57:50.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.361453 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:57:50.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.363095 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:57:50.363127 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:57:50.365086 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:57:50.365155 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:57:50.366652 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:57:50.366699 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:57:50.367931 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:57:50.367973 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:57:50.371383 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:57:50.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.372701 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:57:50.372777 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:57:50.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.376218 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:57:50.376592 systemd[1]: Stopped network-cleanup.service. Jul 2 07:57:50.399456 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:57:50.399617 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:57:50.549459 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:57:50.549668 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:57:50.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.552106 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:57:50.554196 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:57:50.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:50.554281 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:57:50.558936 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:57:50.576311 systemd[1]: Switching root. Jul 2 07:57:50.597029 systemd-journald[185]: Journal stopped Jul 2 07:57:57.148764 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Jul 2 07:57:57.148842 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:57:57.148874 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:57:57.148894 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:57:57.148913 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:57:57.148931 kernel: SELinux: policy capability open_perms=1 Jul 2 07:57:57.149013 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:57:57.149041 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:57:57.149060 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:57:57.149078 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:57:57.149101 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:57:57.149122 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:57:57.149147 systemd[1]: Successfully loaded SELinux policy in 122.186ms. Jul 2 07:57:57.149179 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.831ms. Jul 2 07:57:57.149201 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:57:57.149222 systemd[1]: Detected virtualization amazon. Jul 2 07:57:57.149242 systemd[1]: Detected architecture x86-64. Jul 2 07:57:57.149262 systemd[1]: Detected first boot. Jul 2 07:57:57.149286 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:57:57.149309 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:57:57.149334 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:57:57.149359 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:57.149383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:57.149404 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:57.149424 kernel: kauditd_printk_skb: 55 callbacks suppressed Jul 2 07:57:57.149441 kernel: audit: type=1334 audit(1719907076.791:88): prog-id=12 op=LOAD Jul 2 07:57:57.149462 kernel: audit: type=1334 audit(1719907076.791:89): prog-id=3 op=UNLOAD Jul 2 07:57:57.149478 kernel: audit: type=1334 audit(1719907076.792:90): prog-id=13 op=LOAD Jul 2 07:57:57.149496 kernel: audit: type=1334 audit(1719907076.796:91): prog-id=14 op=LOAD Jul 2 07:57:57.149514 kernel: audit: type=1334 audit(1719907076.796:92): prog-id=4 op=UNLOAD Jul 2 07:57:57.149532 kernel: audit: type=1334 audit(1719907076.796:93): prog-id=5 op=UNLOAD Jul 2 07:57:57.149551 kernel: audit: type=1334 audit(1719907076.801:94): prog-id=15 op=LOAD Jul 2 07:57:57.149572 kernel: audit: type=1334 audit(1719907076.801:95): prog-id=12 op=UNLOAD Jul 2 07:57:57.149593 kernel: audit: type=1334 audit(1719907076.806:96): prog-id=16 op=LOAD Jul 2 07:57:57.149633 kernel: audit: type=1334 audit(1719907076.808:97): prog-id=17 op=LOAD Jul 2 07:57:57.149651 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:57:57.149671 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:57:57.149692 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:57:57.149713 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:57:57.149733 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:57:57.149754 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:57:57.149775 systemd[1]: Created slice system-getty.slice. Jul 2 07:57:57.149795 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:57:57.149812 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:57:57.149830 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:57:57.149849 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:57:57.149869 systemd[1]: Created slice user.slice. Jul 2 07:57:57.149889 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:57:57.149907 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:57:57.149926 systemd[1]: Set up automount boot.automount. Jul 2 07:57:57.149951 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:57:57.149969 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:57:57.149988 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:57:57.150009 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:57:57.150028 systemd[1]: Reached target integritysetup.target. Jul 2 07:57:57.150046 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:57:57.150068 systemd[1]: Reached target remote-fs.target. Jul 2 07:57:57.150088 systemd[1]: Reached target slices.target. Jul 2 07:57:57.150108 systemd[1]: Reached target swap.target. Jul 2 07:57:57.150128 systemd[1]: Reached target torcx.target. Jul 2 07:57:57.150150 systemd[1]: Reached target veritysetup.target. Jul 2 07:57:57.150170 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:57:57.150190 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:57:57.150209 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:57:57.150228 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:57:57.150248 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:57:57.150267 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:57:57.150287 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:57:57.150308 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:57:57.150330 systemd[1]: Mounting media.mount... Jul 2 07:57:57.150350 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:57.150369 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:57:57.150389 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:57:57.150408 systemd[1]: Mounting tmp.mount... Jul 2 07:57:57.150427 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:57:57.150447 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:57.150467 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:57:57.150486 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:57:57.150508 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:57.150608 systemd[1]: Starting modprobe@drm.service... Jul 2 07:57:57.150649 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:57.150671 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:57:57.150691 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:57.150714 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:57:57.150734 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:57:57.150754 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:57:57.150775 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:57:57.150801 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:57:57.150819 systemd[1]: Stopped systemd-journald.service. Jul 2 07:57:57.150837 systemd[1]: Starting systemd-journald.service... Jul 2 07:57:57.150855 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:57:57.150875 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:57:57.150894 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:57:57.150914 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:57:57.150933 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:57:57.150952 systemd[1]: Stopped verity-setup.service. Jul 2 07:57:57.150976 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:57.150998 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:57:57.151020 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:57:57.151043 systemd[1]: Mounted media.mount. Jul 2 07:57:57.151065 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:57:57.151087 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:57:57.151108 systemd[1]: Mounted tmp.mount. Jul 2 07:57:57.151129 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:57:57.151166 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:57:57.151188 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:57:57.151209 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:57.151228 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:57.151248 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:57:57.151267 systemd[1]: Finished modprobe@drm.service. Jul 2 07:57:57.151290 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:57.151311 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:57.151331 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:57:57.151352 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:57:57.151374 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:57:57.151397 systemd[1]: Reached target network-pre.target. Jul 2 07:57:57.151418 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:57:57.151438 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:57:57.151464 systemd-journald[1324]: Journal started Jul 2 07:57:57.151539 systemd-journald[1324]: Runtime Journal (/run/log/journal/ec2d1328b6005cdfc05ef401d46d663c) is 4.8M, max 38.7M, 33.9M free. Jul 2 07:57:51.471000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:57:51.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:57:51.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:57:51.688000 audit: BPF prog-id=10 op=LOAD Jul 2 07:57:51.688000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:57:51.688000 audit: BPF prog-id=11 op=LOAD Jul 2 07:57:51.688000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:57:51.951000 audit[1248]: AVC avc: denied { associate } for pid=1248 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:57:51.951000 audit[1248]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1231 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:51.951000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:57:51.954000 audit[1248]: AVC avc: denied { associate } for pid=1248 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:57:51.954000 audit[1248]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1231 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:51.954000 audit: CWD cwd="/" Jul 2 07:57:51.954000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:51.954000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:51.954000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:57:56.791000 audit: BPF prog-id=12 op=LOAD Jul 2 07:57:56.791000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:57:56.792000 audit: BPF prog-id=13 op=LOAD Jul 2 07:57:56.796000 audit: BPF prog-id=14 op=LOAD Jul 2 07:57:56.796000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:57:56.796000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:57:56.801000 audit: BPF prog-id=15 op=LOAD Jul 2 07:57:56.801000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:57:56.806000 audit: BPF prog-id=16 op=LOAD Jul 2 07:57:56.808000 audit: BPF prog-id=17 op=LOAD Jul 2 07:57:56.808000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:57:56.808000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:57:56.816000 audit: BPF prog-id=18 op=LOAD Jul 2 07:57:56.816000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:57:56.816000 audit: BPF prog-id=19 op=LOAD Jul 2 07:57:56.816000 audit: BPF prog-id=20 op=LOAD Jul 2 07:57:56.816000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:57:56.816000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:57:56.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:56.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:56.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:56.823000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:57:57.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.037000 audit: BPF prog-id=21 op=LOAD Jul 2 07:57:57.037000 audit: BPF prog-id=22 op=LOAD Jul 2 07:57:57.037000 audit: BPF prog-id=23 op=LOAD Jul 2 07:57:57.037000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:57:57.038000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:57:57.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.135000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:57:57.135000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe756394a0 a2=4000 a3=7ffe7563953c items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.135000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:57:56.788100 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:57:51.938679 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:56.818257 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:57:51.939450 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:57:51.939478 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:57:51.939520 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:57:51.939536 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:57:51.939580 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:57:51.939599 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:57:51.939868 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:57:51.939932 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:57:51.939960 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:57:51.941966 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:57:51.942018 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:57:51.942046 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:57:51.942067 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:57:51.942094 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:57:51.942114 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:57:56.020190 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:56.020512 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:56.020676 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:56.021073 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:56.021133 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:57:56.021201 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2024-07-02T07:57:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:57:57.174653 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:57:57.174726 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:57.174753 kernel: loop: module loaded Jul 2 07:57:57.174777 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:57:57.178105 kernel: fuse: init (API version 7.34) Jul 2 07:57:57.182909 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:57:57.187396 systemd[1]: Started systemd-journald.service. Jul 2 07:57:57.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.189080 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:57:57.189275 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:57:57.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.192073 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:57.192287 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:57.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.193963 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:57:57.197226 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:57:57.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.200258 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:57:57.201837 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:57.203876 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:57:57.205999 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:57:57.213062 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:57:57.250845 systemd-journald[1324]: Time spent on flushing to /var/log/journal/ec2d1328b6005cdfc05ef401d46d663c is 52.810ms for 1181 entries. Jul 2 07:57:57.250845 systemd-journald[1324]: System Journal (/var/log/journal/ec2d1328b6005cdfc05ef401d46d663c) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:57:57.312458 systemd-journald[1324]: Received client request to flush runtime journal. Jul 2 07:57:57.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.254162 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:57:57.313984 udevadm[1362]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:57:57.268533 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:57:57.270350 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:57:57.273790 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:57:57.276647 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:57:57.313863 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:57:57.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.467796 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:57:57.977937 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:57:57.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:57.979000 audit: BPF prog-id=24 op=LOAD Jul 2 07:57:57.979000 audit: BPF prog-id=25 op=LOAD Jul 2 07:57:57.979000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:57:57.979000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:57:57.981241 systemd[1]: Starting systemd-udevd.service... Jul 2 07:57:58.005865 systemd-udevd[1365]: Using default interface naming scheme 'v252'. Jul 2 07:57:58.075003 systemd[1]: Started systemd-udevd.service. Jul 2 07:57:58.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.078000 audit: BPF prog-id=26 op=LOAD Jul 2 07:57:58.081563 systemd[1]: Starting systemd-networkd.service... Jul 2 07:57:58.103000 audit: BPF prog-id=27 op=LOAD Jul 2 07:57:58.103000 audit: BPF prog-id=28 op=LOAD Jul 2 07:57:58.103000 audit: BPF prog-id=29 op=LOAD Jul 2 07:57:58.105561 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:57:58.153610 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:57:58.166860 (udev-worker)[1367]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:57:58.179958 systemd[1]: Started systemd-userdbd.service. Jul 2 07:57:58.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.247652 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:57:58.261686 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:57:58.255000 audit[1370]: AVC avc: denied { confidentiality } for pid=1370 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:57:58.255000 audit[1370]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1c65922d0 a1=3207c a2=7f02fd79abc5 a3=5 items=108 ppid=1365 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.255000 audit: CWD cwd="/" Jul 2 07:57:58.255000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=1 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=2 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=3 name=(null) inode=13196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=4 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=5 name=(null) inode=13197 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=6 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=7 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=8 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=9 name=(null) inode=13199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=10 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=11 name=(null) inode=13200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=12 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=13 name=(null) inode=13201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=14 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=15 name=(null) inode=13202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=16 name=(null) inode=13198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=17 name=(null) inode=13203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=18 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=19 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=20 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=21 name=(null) inode=13205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=22 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=23 name=(null) inode=13206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=24 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=25 name=(null) inode=13207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=26 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=27 name=(null) inode=13208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=28 name=(null) inode=13204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=29 name=(null) inode=13209 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=30 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=31 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=32 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=33 name=(null) inode=13211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=34 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=35 name=(null) inode=13212 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=36 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=37 name=(null) inode=13213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=38 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=39 name=(null) inode=13214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=40 name=(null) inode=13210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=41 name=(null) inode=13215 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=42 name=(null) inode=13195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=43 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=44 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=45 name=(null) inode=13217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=46 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=47 name=(null) inode=13218 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=48 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=49 name=(null) inode=13219 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=50 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=51 name=(null) inode=13220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=52 name=(null) inode=13216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=53 name=(null) inode=13221 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=55 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=56 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=57 name=(null) inode=13223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=58 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=59 name=(null) inode=13224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=60 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=61 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=62 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=63 name=(null) inode=13226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=64 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=65 name=(null) inode=13227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=66 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=67 name=(null) inode=13228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=68 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=69 name=(null) inode=13229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=70 name=(null) inode=13225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=71 name=(null) inode=13230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=72 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=73 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=74 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=75 name=(null) inode=13232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=76 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=77 name=(null) inode=13233 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=78 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=79 name=(null) inode=13234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=80 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=81 name=(null) inode=13235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=82 name=(null) inode=13231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=83 name=(null) inode=13236 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=84 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=85 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=86 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=87 name=(null) inode=13238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=88 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=89 name=(null) inode=13239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=90 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=91 name=(null) inode=13240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=92 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=93 name=(null) inode=13241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=94 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=95 name=(null) inode=13242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=96 name=(null) inode=13222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=97 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=98 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=99 name=(null) inode=13244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=100 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=101 name=(null) inode=13245 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=102 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=103 name=(null) inode=13246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=104 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=105 name=(null) inode=13247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=106 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PATH item=107 name=(null) inode=13248 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:58.255000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:57:58.286664 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Jul 2 07:57:58.307649 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Jul 2 07:57:58.308686 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:57:58.340754 systemd-networkd[1374]: lo: Link UP Jul 2 07:57:58.340770 systemd-networkd[1374]: lo: Gained carrier Jul 2 07:57:58.341362 systemd-networkd[1374]: Enumeration completed Jul 2 07:57:58.341487 systemd[1]: Started systemd-networkd.service. Jul 2 07:57:58.341503 systemd-networkd[1374]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:57:58.345271 systemd-networkd[1374]: eth0: Link UP Jul 2 07:57:58.345441 systemd-networkd[1374]: eth0: Gained carrier Jul 2 07:57:58.345642 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:58.356909 systemd-networkd[1374]: eth0: DHCPv4 address 172.31.22.164/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 07:57:58.364692 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Jul 2 07:57:58.371648 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:57:58.407655 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1375) Jul 2 07:57:58.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.580276 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:57:58.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.590856 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:57:58.593478 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:57:58.596249 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:57:58.626827 lvm[1478]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:57:58.658178 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:57:58.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.659942 systemd[1]: Reached target cryptsetup.target. Jul 2 07:57:58.662699 systemd[1]: Starting lvm2-activation.service... Jul 2 07:57:58.667659 lvm[1480]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:57:58.702984 systemd[1]: Finished lvm2-activation.service. Jul 2 07:57:58.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.704288 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:57:58.705380 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:57:58.705412 systemd[1]: Reached target local-fs.target. Jul 2 07:57:58.706439 systemd[1]: Reached target machines.target. Jul 2 07:57:58.709299 systemd[1]: Starting ldconfig.service... Jul 2 07:57:58.710846 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:58.710924 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:58.716924 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:57:58.719665 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:57:58.723053 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:57:58.726765 systemd[1]: Starting systemd-sysext.service... Jul 2 07:57:58.740338 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1482 (bootctl) Jul 2 07:57:58.742594 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:57:58.762454 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:57:58.770292 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:58.770566 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:57:58.801262 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:57:58.803653 kernel: loop0: detected capacity change from 0 to 209816 Jul 2 07:57:58.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.959713 systemd-fsck[1495]: fsck.fat 4.2 (2021-01-31) Jul 2 07:57:58.959713 systemd-fsck[1495]: /dev/nvme0n1p1: 789 files, 119238/258078 clusters Jul 2 07:57:58.962556 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:57:58.966095 systemd[1]: Mounting boot.mount... Jul 2 07:57:58.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:58.978527 systemd[1]: Mounted boot.mount. Jul 2 07:57:59.006370 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:57:59.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.010653 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:57:59.034648 kernel: loop1: detected capacity change from 0 to 209816 Jul 2 07:57:59.048475 (sd-sysext)[1510]: Using extensions 'kubernetes'. Jul 2 07:57:59.049003 (sd-sysext)[1510]: Merged extensions into '/usr'. Jul 2 07:57:59.067141 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:59.068888 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:57:59.070277 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.072313 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:59.076995 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:59.079733 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:59.080966 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.081141 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:59.081524 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:59.085601 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:57:59.086918 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:59.087087 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:59.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.088521 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:59.088738 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:59.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.090410 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:59.090563 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:59.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.092041 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:59.092203 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.093359 systemd[1]: Finished systemd-sysext.service. Jul 2 07:57:59.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.096988 systemd[1]: Starting ensure-sysext.service... Jul 2 07:57:59.099330 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:57:59.109323 systemd[1]: Reloading. Jul 2 07:57:59.170269 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:57:59.175877 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:57:59.208903 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:57:59.221877 /usr/lib/systemd/system-generators/torcx-generator[1539]: time="2024-07-02T07:57:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:59.222355 /usr/lib/systemd/system-generators/torcx-generator[1539]: time="2024-07-02T07:57:59Z" level=info msg="torcx already run" Jul 2 07:57:59.342538 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:59.342565 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:59.367712 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:59.502000 audit: BPF prog-id=30 op=LOAD Jul 2 07:57:59.502000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:57:59.504000 audit: BPF prog-id=31 op=LOAD Jul 2 07:57:59.504000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:57:59.505000 audit: BPF prog-id=32 op=LOAD Jul 2 07:57:59.505000 audit: BPF prog-id=33 op=LOAD Jul 2 07:57:59.505000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:57:59.505000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:57:59.508000 audit: BPF prog-id=34 op=LOAD Jul 2 07:57:59.508000 audit: BPF prog-id=35 op=LOAD Jul 2 07:57:59.508000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:57:59.508000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:57:59.511000 audit: BPF prog-id=36 op=LOAD Jul 2 07:57:59.511000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:57:59.511000 audit: BPF prog-id=37 op=LOAD Jul 2 07:57:59.511000 audit: BPF prog-id=38 op=LOAD Jul 2 07:57:59.511000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:57:59.511000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:57:59.520341 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:57:59.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.531538 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:57:59.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.536012 systemd[1]: Starting audit-rules.service... Jul 2 07:57:59.538541 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:57:59.541562 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:57:59.546000 audit: BPF prog-id=39 op=LOAD Jul 2 07:57:59.549000 audit: BPF prog-id=40 op=LOAD Jul 2 07:57:59.548278 systemd[1]: Starting systemd-resolved.service... Jul 2 07:57:59.552006 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:57:59.555068 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:57:59.562702 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.564710 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:59.567780 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:59.570609 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:59.571762 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.571961 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:59.575273 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:59.575443 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:59.580819 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.582869 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:59.584006 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.584204 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:59.589412 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.592028 systemd[1]: Starting modprobe@drm.service... Jul 2 07:57:59.593286 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.593481 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:59.600006 systemd[1]: Finished ensure-sysext.service. Jul 2 07:57:59.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.603930 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:57:59.605264 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:57:59.607000 audit[1596]: SYSTEM_BOOT pid=1596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.612431 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:57:59.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.614091 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:59.614261 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:59.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.615722 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:59.615872 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:59.617190 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:59.631326 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:59.631500 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:59.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.633194 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:57:59.633373 systemd[1]: Finished modprobe@drm.service. Jul 2 07:57:59.634707 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.665097 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:57:59.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.719070 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:57:59.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:59.720474 systemd[1]: Reached target time-set.target. Jul 2 07:57:59.723000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:57:59.723000 audit[1616]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff5c5e3a0 a2=420 a3=0 items=0 ppid=1591 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.723000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:57:59.724594 augenrules[1616]: No rules Jul 2 07:57:59.725240 systemd[1]: Finished audit-rules.service. Jul 2 07:57:59.737695 systemd-resolved[1594]: Positive Trust Anchors: Jul 2 07:57:59.737712 systemd-resolved[1594]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:57:59.737751 systemd-resolved[1594]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:57:59.770645 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:57:59.770974 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:59.770988 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:59.774104 systemd-resolved[1594]: Defaulting to hostname 'linux'. Jul 2 07:57:59.775878 systemd[1]: Started systemd-resolved.service. Jul 2 07:57:59.776989 systemd[1]: Reached target network.target. Jul 2 07:57:59.777942 systemd[1]: Reached target nss-lookup.target. Jul 2 07:57:59.821045 systemd-timesyncd[1595]: Contacted time server 206.82.16.3:123 (0.flatcar.pool.ntp.org). Jul 2 07:57:59.821239 systemd-timesyncd[1595]: Initial clock synchronization to Tue 2024-07-02 07:57:59.610910 UTC. Jul 2 07:57:59.846798 systemd-networkd[1374]: eth0: Gained IPv6LL Jul 2 07:57:59.848644 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:57:59.850230 systemd[1]: Reached target network-online.target. Jul 2 07:57:59.906299 ldconfig[1481]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:57:59.924900 systemd[1]: Finished ldconfig.service. Jul 2 07:57:59.927204 systemd[1]: Starting systemd-update-done.service... Jul 2 07:57:59.935188 systemd[1]: Finished systemd-update-done.service. Jul 2 07:57:59.936423 systemd[1]: Reached target sysinit.target. Jul 2 07:57:59.937511 systemd[1]: Started motdgen.path. Jul 2 07:57:59.938399 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:57:59.939858 systemd[1]: Started logrotate.timer. Jul 2 07:57:59.941098 systemd[1]: Started mdadm.timer. Jul 2 07:57:59.941945 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:57:59.943052 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:57:59.943076 systemd[1]: Reached target paths.target. Jul 2 07:57:59.944075 systemd[1]: Reached target timers.target. Jul 2 07:57:59.946691 systemd[1]: Listening on dbus.socket. Jul 2 07:57:59.949127 systemd[1]: Starting docker.socket... Jul 2 07:57:59.953455 systemd[1]: Listening on sshd.socket. Jul 2 07:57:59.954752 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:59.955258 systemd[1]: Listening on docker.socket. Jul 2 07:57:59.960692 systemd[1]: Reached target sockets.target. Jul 2 07:57:59.962421 systemd[1]: Reached target basic.target. Jul 2 07:57:59.963828 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.963852 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:57:59.965527 systemd[1]: Started amazon-ssm-agent.service. Jul 2 07:57:59.969226 systemd[1]: Starting containerd.service... Jul 2 07:57:59.978576 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:57:59.981439 systemd[1]: Starting dbus.service... Jul 2 07:57:59.984212 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:57:59.986998 systemd[1]: Starting extend-filesystems.service... Jul 2 07:57:59.988166 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:57:59.990865 systemd[1]: Starting kubelet.service... Jul 2 07:57:59.993833 systemd[1]: Starting motdgen.service... Jul 2 07:57:59.996616 systemd[1]: Started nvidia.service. Jul 2 07:58:00.000542 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:58:00.005321 systemd[1]: Starting sshd-keygen.service... Jul 2 07:58:00.011832 systemd[1]: Starting systemd-logind.service... Jul 2 07:58:00.013231 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:58:00.013308 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:58:00.016552 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:58:00.018156 systemd[1]: Starting update-engine.service... Jul 2 07:58:00.195285 jq[1629]: false Jul 2 07:58:00.196744 jq[1638]: true Jul 2 07:58:00.023024 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:58:00.063999 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:58:00.064227 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:58:00.208878 jq[1641]: true Jul 2 07:58:00.084829 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:58:00.085028 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:58:00.203218 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:58:00.203440 systemd[1]: Finished motdgen.service. Jul 2 07:58:00.297438 extend-filesystems[1630]: Found loop1 Jul 2 07:58:00.298750 extend-filesystems[1630]: Found nvme0n1 Jul 2 07:58:00.298750 extend-filesystems[1630]: Found nvme0n1p1 Jul 2 07:58:00.298750 extend-filesystems[1630]: Found nvme0n1p2 Jul 2 07:58:00.306683 extend-filesystems[1630]: Found nvme0n1p3 Jul 2 07:58:00.306683 extend-filesystems[1630]: Found usr Jul 2 07:58:00.306683 extend-filesystems[1630]: Found nvme0n1p4 Jul 2 07:58:00.306683 extend-filesystems[1630]: Found nvme0n1p6 Jul 2 07:58:00.306683 extend-filesystems[1630]: Found nvme0n1p7 Jul 2 07:58:00.306683 extend-filesystems[1630]: Found nvme0n1p9 Jul 2 07:58:00.306683 extend-filesystems[1630]: Checking size of /dev/nvme0n1p9 Jul 2 07:58:00.369683 dbus-daemon[1628]: [system] SELinux support is enabled Jul 2 07:58:00.370267 systemd[1]: Started dbus.service. Jul 2 07:58:00.374469 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:58:00.374513 systemd[1]: Reached target system-config.target. Jul 2 07:58:00.375846 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:58:00.375873 systemd[1]: Reached target user-config.target. Jul 2 07:58:00.388158 dbus-daemon[1628]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1374 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:58:00.388394 amazon-ssm-agent[1625]: 2024/07/02 07:58:00 Failed to load instance info from vault. RegistrationKey does not exist. Jul 2 07:58:00.394099 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:58:00.410343 amazon-ssm-agent[1625]: Initializing new seelog logger Jul 2 07:58:00.410553 amazon-ssm-agent[1625]: New Seelog Logger Creation Complete Jul 2 07:58:00.412109 amazon-ssm-agent[1625]: 2024/07/02 07:58:00 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 07:58:00.412109 amazon-ssm-agent[1625]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 07:58:00.412828 amazon-ssm-agent[1625]: 2024/07/02 07:58:00 processing appconfig overrides Jul 2 07:58:00.416892 env[1654]: time="2024-07-02T07:58:00.416823455Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:58:00.431565 extend-filesystems[1630]: Resized partition /dev/nvme0n1p9 Jul 2 07:58:00.459670 extend-filesystems[1697]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:58:00.461159 bash[1687]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:58:00.461475 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:58:00.466128 update_engine[1637]: I0702 07:58:00.465289 1637 main.cc:92] Flatcar Update Engine starting Jul 2 07:58:00.477662 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jul 2 07:58:00.485565 systemd[1]: Started update-engine.service. Jul 2 07:58:00.485996 update_engine[1637]: I0702 07:58:00.485836 1637 update_check_scheduler.cc:74] Next update check in 4m26s Jul 2 07:58:00.488928 systemd[1]: Started locksmithd.service. Jul 2 07:58:00.540243 systemd-logind[1636]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:58:00.540275 systemd-logind[1636]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:58:00.540297 systemd-logind[1636]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:58:00.547749 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jul 2 07:58:00.551078 systemd-logind[1636]: New seat seat0. Jul 2 07:58:00.561693 systemd[1]: Started systemd-logind.service. Jul 2 07:58:00.588170 extend-filesystems[1697]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jul 2 07:58:00.588170 extend-filesystems[1697]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 07:58:00.588170 extend-filesystems[1697]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jul 2 07:58:00.592757 extend-filesystems[1630]: Resized filesystem in /dev/nvme0n1p9 Jul 2 07:58:00.594461 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:58:00.594702 systemd[1]: Finished extend-filesystems.service. Jul 2 07:58:00.653295 env[1654]: time="2024-07-02T07:58:00.653240702Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:58:00.667276 env[1654]: time="2024-07-02T07:58:00.667222260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.689107 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 07:58:00.692187 env[1654]: time="2024-07-02T07:58:00.692132792Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:58:00.692351 env[1654]: time="2024-07-02T07:58:00.692332255Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.692910 env[1654]: time="2024-07-02T07:58:00.692876480Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:58:00.693040 env[1654]: time="2024-07-02T07:58:00.693023350Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.693112 env[1654]: time="2024-07-02T07:58:00.693096150Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:58:00.693183 env[1654]: time="2024-07-02T07:58:00.693168255Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.693352 env[1654]: time="2024-07-02T07:58:00.693333767Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.693774 env[1654]: time="2024-07-02T07:58:00.693748785Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:58:00.694083 env[1654]: time="2024-07-02T07:58:00.694057053Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:58:00.694187 env[1654]: time="2024-07-02T07:58:00.694170541Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:58:00.694572 env[1654]: time="2024-07-02T07:58:00.694536063Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:58:00.694702 env[1654]: time="2024-07-02T07:58:00.694685074Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:58:00.706999 coreos-metadata[1627]: Jul 02 07:58:00.706 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 07:58:00.710880 coreos-metadata[1627]: Jul 02 07:58:00.710 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Jul 2 07:58:00.711423 coreos-metadata[1627]: Jul 02 07:58:00.711 INFO Fetch successful Jul 2 07:58:00.711423 coreos-metadata[1627]: Jul 02 07:58:00.711 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 07:58:00.712080 coreos-metadata[1627]: Jul 02 07:58:00.712 INFO Fetch successful Jul 2 07:58:00.714282 unknown[1627]: wrote ssh authorized keys file for user: core Jul 2 07:58:00.714715 env[1654]: time="2024-07-02T07:58:00.714667016Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:58:00.714832 env[1654]: time="2024-07-02T07:58:00.714816803Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:58:00.714957 env[1654]: time="2024-07-02T07:58:00.714942457Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:58:00.715076 env[1654]: time="2024-07-02T07:58:00.715061399Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715163 env[1654]: time="2024-07-02T07:58:00.715149605Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715254 env[1654]: time="2024-07-02T07:58:00.715241167Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715347 env[1654]: time="2024-07-02T07:58:00.715330986Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715465 env[1654]: time="2024-07-02T07:58:00.715447897Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715552 env[1654]: time="2024-07-02T07:58:00.715539382Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715648 env[1654]: time="2024-07-02T07:58:00.715634980Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715743 env[1654]: time="2024-07-02T07:58:00.715730243Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.715812 env[1654]: time="2024-07-02T07:58:00.715800781Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:58:00.716022 env[1654]: time="2024-07-02T07:58:00.716006188Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:58:00.716201 env[1654]: time="2024-07-02T07:58:00.716185420Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:58:00.716586 env[1654]: time="2024-07-02T07:58:00.716566543Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:58:00.716713 env[1654]: time="2024-07-02T07:58:00.716696719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.716812 env[1654]: time="2024-07-02T07:58:00.716786004Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:58:00.716941 env[1654]: time="2024-07-02T07:58:00.716928653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717008 env[1654]: time="2024-07-02T07:58:00.716994451Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717073 env[1654]: time="2024-07-02T07:58:00.717060897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717153 env[1654]: time="2024-07-02T07:58:00.717125291Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717232 env[1654]: time="2024-07-02T07:58:00.717217478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717298 env[1654]: time="2024-07-02T07:58:00.717286401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717369 env[1654]: time="2024-07-02T07:58:00.717357738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717429 env[1654]: time="2024-07-02T07:58:00.717418676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717500 env[1654]: time="2024-07-02T07:58:00.717488381Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:58:00.717751 env[1654]: time="2024-07-02T07:58:00.717732600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717878 env[1654]: time="2024-07-02T07:58:00.717862396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.717974 env[1654]: time="2024-07-02T07:58:00.717946842Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.718047 env[1654]: time="2024-07-02T07:58:00.718033035Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:58:00.718119 env[1654]: time="2024-07-02T07:58:00.718103919Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:58:00.718177 env[1654]: time="2024-07-02T07:58:00.718165002Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:58:00.718243 env[1654]: time="2024-07-02T07:58:00.718230692Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:58:00.718343 env[1654]: time="2024-07-02T07:58:00.718331709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:58:00.718744 env[1654]: time="2024-07-02T07:58:00.718683459Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:58:00.721002 env[1654]: time="2024-07-02T07:58:00.718915890Z" level=info msg="Connect containerd service" Jul 2 07:58:00.721002 env[1654]: time="2024-07-02T07:58:00.718973918Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:58:00.721798 env[1654]: time="2024-07-02T07:58:00.721736903Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:58:00.727864 env[1654]: time="2024-07-02T07:58:00.727795977Z" level=info msg="Start subscribing containerd event" Jul 2 07:58:00.728674 env[1654]: time="2024-07-02T07:58:00.728642922Z" level=info msg="Start recovering state" Jul 2 07:58:00.728964 env[1654]: time="2024-07-02T07:58:00.728936041Z" level=info msg="Start event monitor" Jul 2 07:58:00.729121 env[1654]: time="2024-07-02T07:58:00.729102991Z" level=info msg="Start snapshots syncer" Jul 2 07:58:00.729219 env[1654]: time="2024-07-02T07:58:00.729203623Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:58:00.729307 env[1654]: time="2024-07-02T07:58:00.729294009Z" level=info msg="Start streaming server" Jul 2 07:58:00.730409 env[1654]: time="2024-07-02T07:58:00.730385426Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:58:00.732638 env[1654]: time="2024-07-02T07:58:00.732574990Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:58:00.735856 update-ssh-keys[1730]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:58:00.736393 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:58:00.780035 systemd[1]: Started containerd.service. Jul 2 07:58:00.795792 env[1654]: time="2024-07-02T07:58:00.795731169Z" level=info msg="containerd successfully booted in 0.381731s" Jul 2 07:58:00.801565 dbus-daemon[1628]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:58:00.801789 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:58:00.802674 dbus-daemon[1628]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1689 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:58:00.806924 systemd[1]: Starting polkit.service... Jul 2 07:58:00.841383 polkitd[1748]: Started polkitd version 121 Jul 2 07:58:00.866132 polkitd[1748]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:58:00.866213 polkitd[1748]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:58:00.868798 polkitd[1748]: Finished loading, compiling and executing 2 rules Jul 2 07:58:00.869348 dbus-daemon[1628]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:58:00.869530 systemd[1]: Started polkit.service. Jul 2 07:58:00.871821 polkitd[1748]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:58:00.899326 systemd-hostnamed[1689]: Hostname set to (transient) Jul 2 07:58:00.899326 systemd-resolved[1594]: System hostname changed to 'ip-172-31-22-164'. Jul 2 07:58:00.982861 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Create new startup processor Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [LongRunningPluginsManager] registered plugins: {} Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing bookkeeping folders Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO removing the completed state files Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing bookkeeping folders for long running plugins Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing healthcheck folders for long running plugins Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing locations for inventory plugin Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing default location for custom inventory Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing default location for file inventory Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Initializing default location for role inventory Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Init the cloudwatchlogs publisher Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:downloadContent Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:runDocument Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:updateSsmAgent Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:configureDocker Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:runDockerAction Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:refreshAssociation Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:configurePackage Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:softwareInventory Jul 2 07:58:00.985020 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform independent plugin aws:runPowerShellScript Jul 2 07:58:00.985891 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Successfully loaded platform dependent plugin aws:runShellScript Jul 2 07:58:00.985891 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Jul 2 07:58:00.985891 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO OS: linux, Arch: amd64 Jul 2 07:58:00.985891 amazon-ssm-agent[1625]: datastore file /var/lib/amazon/ssm/i-0991468f74042cbf8/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Jul 2 07:58:01.083333 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] Starting document processing engine... Jul 2 07:58:01.177507 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [EngineProcessor] Starting Jul 2 07:58:01.271862 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Jul 2 07:58:01.366335 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] Starting message polling Jul 2 07:58:01.407055 locksmithd[1704]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:58:01.461099 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] Starting send replies to MDS Jul 2 07:58:01.555966 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [instanceID=i-0991468f74042cbf8] Starting association polling Jul 2 07:58:01.650995 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Jul 2 07:58:01.746361 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [Association] Launching response handler Jul 2 07:58:01.813113 systemd[1]: Started kubelet.service. Jul 2 07:58:01.841781 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Jul 2 07:58:01.937470 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Jul 2 07:58:02.033669 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Jul 2 07:58:02.129703 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessageGatewayService] Starting session document processing engine... Jul 2 07:58:02.227032 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessageGatewayService] [EngineProcessor] Starting Jul 2 07:58:02.324369 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Jul 2 07:58:02.422834 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0991468f74042cbf8, requestId: 27b7814d-0e32-4afb-882d-6f52a8f3a8d6 Jul 2 07:58:02.510505 sshd_keygen[1660]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:58:02.518573 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [OfflineService] Starting document processing engine... Jul 2 07:58:02.551352 systemd[1]: Finished sshd-keygen.service. Jul 2 07:58:02.554089 systemd[1]: Starting issuegen.service... Jul 2 07:58:02.566303 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:58:02.566527 systemd[1]: Finished issuegen.service. Jul 2 07:58:02.571107 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:58:02.585944 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:58:02.590969 systemd[1]: Started getty@tty1.service. Jul 2 07:58:02.595749 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:58:02.597253 systemd[1]: Reached target getty.target. Jul 2 07:58:02.598960 systemd[1]: Reached target multi-user.target. Jul 2 07:58:02.602505 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:58:02.615630 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [OfflineService] [EngineProcessor] Starting Jul 2 07:58:02.617725 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:58:02.618006 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:58:02.619474 systemd[1]: Startup finished in 723ms (kernel) + 7.507s (initrd) + 11.313s (userspace) = 19.544s. Jul 2 07:58:02.724807 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [OfflineService] [EngineProcessor] Initial processing Jul 2 07:58:02.822316 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [OfflineService] Starting message polling Jul 2 07:58:02.920019 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [OfflineService] Starting send replies to MDS Jul 2 07:58:02.949893 kubelet[1819]: E0702 07:58:02.949817 1819 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:58:02.951855 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:58:02.952023 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:58:02.952312 systemd[1]: kubelet.service: Consumed 1.244s CPU time. Jul 2 07:58:03.020860 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [LongRunningPluginsManager] starting long running plugin manager Jul 2 07:58:03.118853 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Jul 2 07:58:03.217136 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [HealthCheck] HealthCheck reporting agent health. Jul 2 07:58:03.315567 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [MessageGatewayService] listening reply. Jul 2 07:58:03.414147 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Jul 2 07:58:03.515559 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [StartupProcessor] Executing startup processor tasks Jul 2 07:58:03.614552 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Jul 2 07:58:03.713782 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Jul 2 07:58:03.813232 amazon-ssm-agent[1625]: 2024-07-02 07:58:00 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.5 Jul 2 07:58:03.912779 amazon-ssm-agent[1625]: 2024-07-02 07:58:01 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0991468f74042cbf8?role=subscribe&stream=input Jul 2 07:58:04.012611 amazon-ssm-agent[1625]: 2024-07-02 07:58:01 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0991468f74042cbf8?role=subscribe&stream=input Jul 2 07:58:04.112705 amazon-ssm-agent[1625]: 2024-07-02 07:58:01 INFO [MessageGatewayService] Starting receiving message from control channel Jul 2 07:58:04.212877 amazon-ssm-agent[1625]: 2024-07-02 07:58:01 INFO [MessageGatewayService] [EngineProcessor] Initial processing Jul 2 07:58:08.739992 systemd[1]: Created slice system-sshd.slice. Jul 2 07:58:08.742485 systemd[1]: Started sshd@0-172.31.22.164:22-139.178.89.65:49620.service. Jul 2 07:58:08.950834 sshd[1840]: Accepted publickey for core from 139.178.89.65 port 49620 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:08.953512 sshd[1840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:08.976169 systemd[1]: Created slice user-500.slice. Jul 2 07:58:08.981651 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:58:08.986692 systemd-logind[1636]: New session 1 of user core. Jul 2 07:58:08.991860 amazon-ssm-agent[1625]: 2024-07-02 07:58:08 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Jul 2 07:58:08.999395 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:58:09.001430 systemd[1]: Starting user@500.service... Jul 2 07:58:09.006222 (systemd)[1843]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:09.160090 systemd[1843]: Queued start job for default target default.target. Jul 2 07:58:09.160985 systemd[1843]: Reached target paths.target. Jul 2 07:58:09.161018 systemd[1843]: Reached target sockets.target. Jul 2 07:58:09.161036 systemd[1843]: Reached target timers.target. Jul 2 07:58:09.161053 systemd[1843]: Reached target basic.target. Jul 2 07:58:09.161225 systemd[1]: Started user@500.service. Jul 2 07:58:09.163875 systemd[1]: Started session-1.scope. Jul 2 07:58:09.165696 systemd[1843]: Reached target default.target. Jul 2 07:58:09.166181 systemd[1843]: Startup finished in 151ms. Jul 2 07:58:09.320842 systemd[1]: Started sshd@1-172.31.22.164:22-139.178.89.65:49630.service. Jul 2 07:58:09.505499 sshd[1852]: Accepted publickey for core from 139.178.89.65 port 49630 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:09.508171 sshd[1852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:09.560386 systemd-logind[1636]: New session 2 of user core. Jul 2 07:58:09.561002 systemd[1]: Started session-2.scope. Jul 2 07:58:09.795063 sshd[1852]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:09.803712 systemd[1]: sshd@1-172.31.22.164:22-139.178.89.65:49630.service: Deactivated successfully. Jul 2 07:58:09.816051 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:58:09.834607 systemd-logind[1636]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:58:09.836980 systemd[1]: Started sshd@2-172.31.22.164:22-139.178.89.65:49644.service. Jul 2 07:58:09.838687 systemd-logind[1636]: Removed session 2. Jul 2 07:58:10.014718 sshd[1858]: Accepted publickey for core from 139.178.89.65 port 49644 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:10.016726 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:10.023060 systemd[1]: Started session-3.scope. Jul 2 07:58:10.023811 systemd-logind[1636]: New session 3 of user core. Jul 2 07:58:10.144393 sshd[1858]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:10.154359 systemd[1]: sshd@2-172.31.22.164:22-139.178.89.65:49644.service: Deactivated successfully. Jul 2 07:58:10.155455 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:58:10.159854 systemd-logind[1636]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:58:10.165093 systemd-logind[1636]: Removed session 3. Jul 2 07:58:10.178736 systemd[1]: Started sshd@3-172.31.22.164:22-139.178.89.65:49656.service. Jul 2 07:58:10.366991 sshd[1864]: Accepted publickey for core from 139.178.89.65 port 49656 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:10.368845 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:10.383268 systemd-logind[1636]: New session 4 of user core. Jul 2 07:58:10.386453 systemd[1]: Started session-4.scope. Jul 2 07:58:10.525754 sshd[1864]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:10.530152 systemd[1]: sshd@3-172.31.22.164:22-139.178.89.65:49656.service: Deactivated successfully. Jul 2 07:58:10.531261 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:58:10.534104 systemd-logind[1636]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:58:10.535358 systemd-logind[1636]: Removed session 4. Jul 2 07:58:10.554933 systemd[1]: Started sshd@4-172.31.22.164:22-139.178.89.65:49666.service. Jul 2 07:58:10.730138 sshd[1870]: Accepted publickey for core from 139.178.89.65 port 49666 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:10.731679 sshd[1870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:10.737916 systemd[1]: Started session-5.scope. Jul 2 07:58:10.738463 systemd-logind[1636]: New session 5 of user core. Jul 2 07:58:10.914384 sudo[1873]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:58:10.914722 sudo[1873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:10.934888 dbus-daemon[1628]: Н$ǙU: received setenforce notice (enforcing=-214125856) Jul 2 07:58:10.938597 sudo[1873]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:10.967486 sshd[1870]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:10.980373 systemd[1]: sshd@4-172.31.22.164:22-139.178.89.65:49666.service: Deactivated successfully. Jul 2 07:58:10.983879 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:58:10.996428 systemd-logind[1636]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:58:11.019330 systemd[1]: Started sshd@5-172.31.22.164:22-139.178.89.65:49674.service. Jul 2 07:58:11.023304 systemd-logind[1636]: Removed session 5. Jul 2 07:58:11.195724 sshd[1877]: Accepted publickey for core from 139.178.89.65 port 49674 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:11.197512 sshd[1877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:11.204294 systemd[1]: Started session-6.scope. Jul 2 07:58:11.205167 systemd-logind[1636]: New session 6 of user core. Jul 2 07:58:11.307038 sudo[1881]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:58:11.307362 sudo[1881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:11.313535 sudo[1881]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:11.319424 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:58:11.319797 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:11.336954 systemd[1]: Stopping audit-rules.service... Jul 2 07:58:11.337000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:58:11.340308 kernel: kauditd_printk_skb: 226 callbacks suppressed Jul 2 07:58:11.340384 kernel: audit: type=1305 audit(1719907091.337:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:58:11.340418 auditctl[1884]: No rules Jul 2 07:58:11.337000 audit[1884]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbfca6110 a2=420 a3=0 items=0 ppid=1 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.346683 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:58:11.347172 systemd[1]: Stopped audit-rules.service. Jul 2 07:58:11.358578 kernel: audit: type=1300 audit(1719907091.337:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbfca6110 a2=420 a3=0 items=0 ppid=1 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.359446 systemd[1]: Starting audit-rules.service... Jul 2 07:58:11.337000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:58:11.368343 kernel: audit: type=1327 audit(1719907091.337:209): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:58:11.368440 kernel: audit: type=1131 audit(1719907091.339:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.386826 augenrules[1901]: No rules Jul 2 07:58:11.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.390286 sudo[1880]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:11.388265 systemd[1]: Finished audit-rules.service. Jul 2 07:58:11.395673 kernel: audit: type=1130 audit(1719907091.387:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.388000 audit[1880]: USER_END pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.388000 audit[1880]: CRED_DISP pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.407425 kernel: audit: type=1106 audit(1719907091.388:212): pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.407595 kernel: audit: type=1104 audit(1719907091.388:213): pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.412861 sshd[1877]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:11.412000 audit[1877]: USER_END pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.417336 systemd[1]: sshd@5-172.31.22.164:22-139.178.89.65:49674.service: Deactivated successfully. Jul 2 07:58:11.418429 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:58:11.420252 systemd-logind[1636]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:58:11.412000 audit[1877]: CRED_DISP pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.422816 systemd-logind[1636]: Removed session 6. Jul 2 07:58:11.428163 kernel: audit: type=1106 audit(1719907091.412:214): pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.428409 kernel: audit: type=1104 audit(1719907091.412:215): pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.428499 kernel: audit: type=1131 audit(1719907091.416:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.164:22-139.178.89.65:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.164:22-139.178.89.65:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.164:22-139.178.89.65:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.438680 systemd[1]: Started sshd@6-172.31.22.164:22-139.178.89.65:49684.service. Jul 2 07:58:11.602000 audit[1907]: USER_ACCT pid=1907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.604981 sshd[1907]: Accepted publickey for core from 139.178.89.65 port 49684 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4 Jul 2 07:58:11.604000 audit[1907]: CRED_ACQ pid=1907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.604000 audit[1907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7644a030 a2=3 a3=0 items=0 ppid=1 pid=1907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:11.606090 sshd[1907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:11.612997 systemd[1]: Started session-7.scope. Jul 2 07:58:11.613462 systemd-logind[1636]: New session 7 of user core. Jul 2 07:58:11.618000 audit[1907]: USER_START pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.620000 audit[1909]: CRED_ACQ pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:11.712000 audit[1910]: USER_ACCT pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.714396 sudo[1910]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:58:11.712000 audit[1910]: CRED_REFR pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.714731 sudo[1910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:11.715000 audit[1910]: USER_START pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.731359 systemd[1]: Starting coreos-metadata.service... Jul 2 07:58:11.844287 coreos-metadata[1914]: Jul 02 07:58:11.844 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 07:58:11.845345 coreos-metadata[1914]: Jul 02 07:58:11.845 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Jul 2 07:58:11.845958 coreos-metadata[1914]: Jul 02 07:58:11.845 INFO Fetch successful Jul 2 07:58:11.846077 coreos-metadata[1914]: Jul 02 07:58:11.846 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Jul 2 07:58:11.846751 coreos-metadata[1914]: Jul 02 07:58:11.846 INFO Fetch successful Jul 2 07:58:11.846819 coreos-metadata[1914]: Jul 02 07:58:11.846 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Jul 2 07:58:11.847235 coreos-metadata[1914]: Jul 02 07:58:11.847 INFO Fetch successful Jul 2 07:58:11.847333 coreos-metadata[1914]: Jul 02 07:58:11.847 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Jul 2 07:58:11.847950 coreos-metadata[1914]: Jul 02 07:58:11.847 INFO Fetch successful Jul 2 07:58:11.848063 coreos-metadata[1914]: Jul 02 07:58:11.847 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Jul 2 07:58:11.848675 coreos-metadata[1914]: Jul 02 07:58:11.848 INFO Fetch successful Jul 2 07:58:11.853191 coreos-metadata[1914]: Jul 02 07:58:11.853 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Jul 2 07:58:11.853931 coreos-metadata[1914]: Jul 02 07:58:11.853 INFO Fetch successful Jul 2 07:58:11.854104 coreos-metadata[1914]: Jul 02 07:58:11.854 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Jul 2 07:58:11.854520 coreos-metadata[1914]: Jul 02 07:58:11.854 INFO Fetch successful Jul 2 07:58:11.854685 coreos-metadata[1914]: Jul 02 07:58:11.854 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Jul 2 07:58:11.855119 coreos-metadata[1914]: Jul 02 07:58:11.855 INFO Fetch successful Jul 2 07:58:11.871012 systemd[1]: Finished coreos-metadata.service. Jul 2 07:58:11.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:12.967928 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:58:12.968265 systemd[1]: Stopped kubelet.service. Jul 2 07:58:12.968330 systemd[1]: kubelet.service: Consumed 1.244s CPU time. Jul 2 07:58:12.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:12.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:12.971592 systemd[1]: Starting kubelet.service... Jul 2 07:58:13.146842 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:58:13.146947 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:58:13.147310 systemd[1]: Stopped kubelet.service. Jul 2 07:58:13.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:58:13.150569 systemd[1]: Starting kubelet.service... Jul 2 07:58:13.177812 systemd[1]: Reloading. Jul 2 07:58:13.294561 /usr/lib/systemd/system-generators/torcx-generator[1974]: time="2024-07-02T07:58:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:58:13.306857 /usr/lib/systemd/system-generators/torcx-generator[1974]: time="2024-07-02T07:58:13Z" level=info msg="torcx already run" Jul 2 07:58:13.414232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:58:13.414382 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:58:13.438448 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.543000 audit: BPF prog-id=49 op=LOAD Jul 2 07:58:13.543000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit: BPF prog-id=50 op=LOAD Jul 2 07:58:13.545000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit: BPF prog-id=51 op=LOAD Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.545000 audit: BPF prog-id=52 op=LOAD Jul 2 07:58:13.545000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:58:13.545000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:58:13.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit: BPF prog-id=53 op=LOAD Jul 2 07:58:13.547000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.548000 audit: BPF prog-id=54 op=LOAD Jul 2 07:58:13.548000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit: BPF prog-id=55 op=LOAD Jul 2 07:58:13.552000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit: BPF prog-id=56 op=LOAD Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.552000 audit: BPF prog-id=57 op=LOAD Jul 2 07:58:13.552000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:58:13.552000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit: BPF prog-id=58 op=LOAD Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.553000 audit: BPF prog-id=59 op=LOAD Jul 2 07:58:13.553000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:58:13.553000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.556000 audit: BPF prog-id=60 op=LOAD Jul 2 07:58:13.556000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit: BPF prog-id=61 op=LOAD Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.557000 audit: BPF prog-id=62 op=LOAD Jul 2 07:58:13.557000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:58:13.557000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:58:13.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit: BPF prog-id=63 op=LOAD Jul 2 07:58:13.564000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit: BPF prog-id=64 op=LOAD Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.564000 audit: BPF prog-id=65 op=LOAD Jul 2 07:58:13.564000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:58:13.564000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:13.565000 audit: BPF prog-id=66 op=LOAD Jul 2 07:58:13.565000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:58:13.586928 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:58:13.587021 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:58:13.587356 systemd[1]: Stopped kubelet.service. Jul 2 07:58:13.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:58:13.589479 systemd[1]: Starting kubelet.service... Jul 2 07:58:14.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:14.052201 systemd[1]: Started kubelet.service. Jul 2 07:58:14.186598 kubelet[2031]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:58:14.186598 kubelet[2031]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:58:14.186598 kubelet[2031]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:58:14.187123 kubelet[2031]: I0702 07:58:14.186708 2031 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:58:14.798526 kubelet[2031]: I0702 07:58:14.798445 2031 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:58:14.798526 kubelet[2031]: I0702 07:58:14.798518 2031 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:58:14.799266 kubelet[2031]: I0702 07:58:14.799230 2031 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:58:14.834573 kubelet[2031]: I0702 07:58:14.834541 2031 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:58:14.852264 kubelet[2031]: I0702 07:58:14.852225 2031 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:58:14.857258 kubelet[2031]: I0702 07:58:14.857209 2031 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:58:14.857482 kubelet[2031]: I0702 07:58:14.857458 2031 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:58:14.857948 kubelet[2031]: I0702 07:58:14.857925 2031 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:58:14.858016 kubelet[2031]: I0702 07:58:14.857956 2031 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:58:14.858843 kubelet[2031]: I0702 07:58:14.858820 2031 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:58:14.860269 kubelet[2031]: I0702 07:58:14.860246 2031 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:58:14.860431 kubelet[2031]: I0702 07:58:14.860275 2031 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:58:14.860431 kubelet[2031]: I0702 07:58:14.860375 2031 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:58:14.860431 kubelet[2031]: I0702 07:58:14.860394 2031 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:58:14.861054 kubelet[2031]: E0702 07:58:14.861038 2031 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:14.862148 kubelet[2031]: E0702 07:58:14.862035 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:14.863222 kubelet[2031]: I0702 07:58:14.862265 2031 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:58:14.867298 kubelet[2031]: W0702 07:58:14.867263 2031 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:58:14.868112 kubelet[2031]: I0702 07:58:14.868052 2031 server.go:1232] "Started kubelet" Jul 2 07:58:14.870870 kubelet[2031]: I0702 07:58:14.870851 2031 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:58:14.871194 kubelet[2031]: I0702 07:58:14.871177 2031 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:58:14.871748 kubelet[2031]: I0702 07:58:14.871612 2031 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:58:14.873000 kubelet[2031]: E0702 07:58:14.872757 2031 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:58:14.873000 kubelet[2031]: E0702 07:58:14.872882 2031 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:58:14.873130 kubelet[2031]: W0702 07:58:14.873049 2031 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:58:14.873130 kubelet[2031]: E0702 07:58:14.873074 2031 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:58:14.873738 kubelet[2031]: I0702 07:58:14.873715 2031 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:58:14.874000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.874000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:14.874000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000849c50 a1=c00093e918 a2=c000849c20 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.874000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:14.876956 kubelet[2031]: I0702 07:58:14.876942 2031 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:58:14.875000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.875000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:14.875000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009703c0 a1=c00093e930 a2=c000849ce0 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.875000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:14.877282 kubelet[2031]: I0702 07:58:14.877271 2031 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:58:14.877421 kubelet[2031]: I0702 07:58:14.877410 2031 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:58:14.878144 kubelet[2031]: I0702 07:58:14.877777 2031 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:58:14.879566 kubelet[2031]: I0702 07:58:14.879539 2031 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:58:14.879666 kubelet[2031]: I0702 07:58:14.879648 2031 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:58:14.880468 kubelet[2031]: E0702 07:58:14.880386 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ec48559c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 868022684, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 868022684, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.880724 kubelet[2031]: W0702 07:58:14.880703 2031 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.22.164" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:58:14.880794 kubelet[2031]: E0702 07:58:14.880731 2031 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.164" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:58:14.881296 kubelet[2031]: E0702 07:58:14.881011 2031 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.22.164\" not found" Jul 2 07:58:14.884673 kubelet[2031]: E0702 07:58:14.884653 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.164\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 07:58:14.884767 kubelet[2031]: W0702 07:58:14.884709 2031 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 07:58:14.884767 kubelet[2031]: E0702 07:58:14.884737 2031 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 07:58:14.884869 kubelet[2031]: E0702 07:58:14.884769 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ec92444d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 872867917, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 872867917, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.925254 kubelet[2031]: I0702 07:58:14.925218 2031 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:58:14.925467 kubelet[2031]: I0702 07:58:14.925454 2031 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:58:14.926072 kubelet[2031]: E0702 07:58:14.925805 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92c2c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.164 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923231943, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923231943, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.926481 kubelet[2031]: I0702 07:58:14.926470 2031 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:58:14.930330 kubelet[2031]: I0702 07:58:14.930304 2031 policy_none.go:49] "None policy: Start" Jul 2 07:58:14.932561 kubelet[2031]: I0702 07:58:14.932545 2031 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:58:14.932805 kubelet[2031]: I0702 07:58:14.932795 2031 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:58:14.935285 kubelet[2031]: E0702 07:58:14.935216 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92f2c9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.164 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923244233, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923244233, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.941367 systemd[1]: Created slice kubepods.slice. Jul 2 07:58:14.944758 kubelet[2031]: E0702 07:58:14.944659 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef930733", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.164 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923249459, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923249459, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.950850 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:58:14.958167 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:58:14.971112 kubelet[2031]: I0702 07:58:14.971076 2031 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:58:14.971423 kubelet[2031]: I0702 07:58:14.971410 2031 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:58:14.971979 kubelet[2031]: I0702 07:58:14.971963 2031 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:58:14.973763 kubelet[2031]: E0702 07:58:14.973747 2031 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.164\" not found" Jul 2 07:58:14.970000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.970000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:14.970000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005b7ce0 a1=c000ea5b78 a2=c0005b7c80 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.970000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:14.982748 kubelet[2031]: I0702 07:58:14.982715 2031 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.164" Jul 2 07:58:14.985163 kubelet[2031]: E0702 07:58:14.984908 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663f2f988f9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 980299001, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 980299001, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.986000 audit[2046]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:14.986000 audit[2046]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0927e4f0 a2=0 a3=7fff0927e4dc items=0 ppid=2031 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:58:14.988000 audit[2050]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:14.988000 audit[2050]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff0644b330 a2=0 a3=7fff0644b31c items=0 ppid=2031 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:58:14.993489 kubelet[2031]: E0702 07:58:14.993321 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92c2c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.164 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923231943, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 982322577, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92c2c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.993656 kubelet[2031]: E0702 07:58:14.993646 2031 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.164" Jul 2 07:58:14.994685 kubelet[2031]: E0702 07:58:14.994606 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92f2c9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.164 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923244233, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 982359756, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92f2c9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.998046 kubelet[2031]: E0702 07:58:14.995777 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef930733", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.164 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923249459, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 982364429, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef930733" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:14.991000 audit[2052]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:14.991000 audit[2052]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0765b420 a2=0 a3=7ffc0765b40c items=0 ppid=2031 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:15.031000 audit[2057]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:15.031000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe09ca100 a2=0 a3=7fffe09ca0ec items=0 ppid=2031 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:15.091114 kubelet[2031]: E0702 07:58:15.090916 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.164\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Jul 2 07:58:15.172000 audit[2062]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:15.172000 audit[2062]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca027de40 a2=0 a3=7ffca027de2c items=0 ppid=2031 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:58:15.173672 kubelet[2031]: I0702 07:58:15.173610 2031 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:58:15.174000 audit[2063]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:15.174000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8b32cbf0 a2=0 a3=7fff8b32cbdc items=0 ppid=2031 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:58:15.175521 kubelet[2031]: I0702 07:58:15.175482 2031 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:58:15.175521 kubelet[2031]: I0702 07:58:15.175510 2031 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:58:15.175610 kubelet[2031]: I0702 07:58:15.175536 2031 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:58:15.175729 kubelet[2031]: E0702 07:58:15.175713 2031 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 07:58:15.175000 audit[2064]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:15.175000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd116355d0 a2=0 a3=7ffd116355bc items=0 ppid=2031 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:58:15.178187 kubelet[2031]: W0702 07:58:15.178162 2031 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 07:58:15.178296 kubelet[2031]: E0702 07:58:15.178199 2031 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 07:58:15.177000 audit[2065]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2065 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:15.177000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd99ad8070 a2=0 a3=7ffd99ad805c items=0 ppid=2031 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:58:15.178000 audit[2066]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:15.178000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdb76fd280 a2=0 a3=7ffdb76fd26c items=0 ppid=2031 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:58:15.179000 audit[2067]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:15.179000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcc8914530 a2=0 a3=7ffcc891451c items=0 ppid=2031 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:58:15.181000 audit[2068]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:15.181000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6b775750 a2=0 a3=7fff6b77573c items=0 ppid=2031 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:58:15.181000 audit[2069]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2069 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:15.181000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd654501e0 a2=0 a3=7ffd654501cc items=0 ppid=2031 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:15.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:58:15.195511 kubelet[2031]: I0702 07:58:15.195476 2031 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.164" Jul 2 07:58:15.204061 kubelet[2031]: E0702 07:58:15.204022 2031 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.164" Jul 2 07:58:15.204403 kubelet[2031]: E0702 07:58:15.204017 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92c2c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.164 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923231943, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 195422952, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92c2c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.207903 kubelet[2031]: E0702 07:58:15.207814 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92f2c9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.164 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923244233, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 195438322, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92f2c9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.209233 kubelet[2031]: E0702 07:58:15.209149 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef930733", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.164 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923249459, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 195442996, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef930733" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.503015 kubelet[2031]: E0702 07:58:15.502894 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.164\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Jul 2 07:58:15.605203 kubelet[2031]: I0702 07:58:15.605166 2031 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.164" Jul 2 07:58:15.608031 kubelet[2031]: E0702 07:58:15.607984 2031 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.164" Jul 2 07:58:15.608031 kubelet[2031]: E0702 07:58:15.607937 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92c2c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.164 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923231943, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 605116126, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92c2c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.609541 kubelet[2031]: E0702 07:58:15.609456 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef92f2c9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.164 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923244233, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 605123147, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef92f2c9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.611036 kubelet[2031]: E0702 07:58:15.610957 2031 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164.17de5663ef930733", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.164", UID:"172.31.22.164", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.164 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.164"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 58, 14, 923249459, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 58, 15, 605128063, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.164"}': 'events "172.31.22.164.17de5663ef930733" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:58:15.834151 kubelet[2031]: I0702 07:58:15.833925 2031 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 07:58:15.862172 kubelet[2031]: E0702 07:58:15.862126 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:16.251887 kubelet[2031]: E0702 07:58:16.251775 2031 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.22.164" not found Jul 2 07:58:16.308448 kubelet[2031]: E0702 07:58:16.308405 2031 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.22.164\" not found" node="172.31.22.164" Jul 2 07:58:16.409116 kubelet[2031]: I0702 07:58:16.409090 2031 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.164" Jul 2 07:58:16.427206 kubelet[2031]: I0702 07:58:16.427159 2031 kubelet_node_status.go:73] "Successfully registered node" node="172.31.22.164" Jul 2 07:58:16.542696 kubelet[2031]: I0702 07:58:16.542576 2031 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 07:58:16.543256 env[1654]: time="2024-07-02T07:58:16.543194339Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:58:16.543663 kubelet[2031]: I0702 07:58:16.543393 2031 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 07:58:16.615669 sudo[1910]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:16.614000 audit[1910]: USER_END pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.616918 kernel: kauditd_printk_skb: 271 callbacks suppressed Jul 2 07:58:16.617006 kernel: audit: type=1106 audit(1719907096.614:453): pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.621000 audit[1910]: CRED_DISP pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.632042 kernel: audit: type=1104 audit(1719907096.621:454): pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.649106 sshd[1907]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:16.650000 audit[1907]: USER_END pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:16.652838 systemd[1]: sshd@6-172.31.22.164:22-139.178.89.65:49684.service: Deactivated successfully. Jul 2 07:58:16.654008 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:58:16.656493 systemd-logind[1636]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:58:16.658180 systemd-logind[1636]: Removed session 7. Jul 2 07:58:16.659661 kernel: audit: type=1106 audit(1719907096.650:455): pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:16.650000 audit[1907]: CRED_DISP pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:16.664648 kernel: audit: type=1104 audit(1719907096.650:456): pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 07:58:16.664766 kernel: audit: type=1131 audit(1719907096.652:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.164:22-139.178.89.65:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.164:22-139.178.89.65:49684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:16.863379 kubelet[2031]: I0702 07:58:16.862919 2031 apiserver.go:52] "Watching apiserver" Jul 2 07:58:16.863733 kubelet[2031]: E0702 07:58:16.863702 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:16.866818 kubelet[2031]: I0702 07:58:16.866791 2031 topology_manager.go:215] "Topology Admit Handler" podUID="520bf8b8-5572-45b3-9b6a-f67fd55935d7" podNamespace="calico-system" podName="calico-node-nkmh7" Jul 2 07:58:16.866953 kubelet[2031]: I0702 07:58:16.866941 2031 topology_manager.go:215] "Topology Admit Handler" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" podNamespace="calico-system" podName="csi-node-driver-kvxbz" Jul 2 07:58:16.867023 kubelet[2031]: I0702 07:58:16.867004 2031 topology_manager.go:215] "Topology Admit Handler" podUID="4124a53b-b6f8-452b-9402-75958d6e9af7" podNamespace="kube-system" podName="kube-proxy-45wvq" Jul 2 07:58:16.867574 kubelet[2031]: E0702 07:58:16.867422 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:16.880330 systemd[1]: Created slice kubepods-besteffort-pod4124a53b_b6f8_452b_9402_75958d6e9af7.slice. Jul 2 07:58:16.881698 kubelet[2031]: I0702 07:58:16.881587 2031 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:58:16.891483 kubelet[2031]: I0702 07:58:16.891450 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-cni-log-dir\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.891685 kubelet[2031]: I0702 07:58:16.891496 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4124a53b-b6f8-452b-9402-75958d6e9af7-xtables-lock\") pod \"kube-proxy-45wvq\" (UID: \"4124a53b-b6f8-452b-9402-75958d6e9af7\") " pod="kube-system/kube-proxy-45wvq" Jul 2 07:58:16.891685 kubelet[2031]: I0702 07:58:16.891530 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8bb0cda0-286b-43a6-8c07-91eb35df53bc-registration-dir\") pod \"csi-node-driver-kvxbz\" (UID: \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\") " pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:16.891685 kubelet[2031]: I0702 07:58:16.891556 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4124a53b-b6f8-452b-9402-75958d6e9af7-kube-proxy\") pod \"kube-proxy-45wvq\" (UID: \"4124a53b-b6f8-452b-9402-75958d6e9af7\") " pod="kube-system/kube-proxy-45wvq" Jul 2 07:58:16.891685 kubelet[2031]: I0702 07:58:16.891582 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4124a53b-b6f8-452b-9402-75958d6e9af7-lib-modules\") pod \"kube-proxy-45wvq\" (UID: \"4124a53b-b6f8-452b-9402-75958d6e9af7\") " pod="kube-system/kube-proxy-45wvq" Jul 2 07:58:16.891685 kubelet[2031]: I0702 07:58:16.891608 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-lib-modules\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.891901 kubelet[2031]: I0702 07:58:16.891661 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-policysync\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.891901 kubelet[2031]: I0702 07:58:16.891689 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/520bf8b8-5572-45b3-9b6a-f67fd55935d7-node-certs\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.891901 kubelet[2031]: I0702 07:58:16.891717 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-cni-bin-dir\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.891901 kubelet[2031]: I0702 07:58:16.891748 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8bb0cda0-286b-43a6-8c07-91eb35df53bc-varrun\") pod \"csi-node-driver-kvxbz\" (UID: \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\") " pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:16.891901 kubelet[2031]: I0702 07:58:16.891778 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-cni-net-dir\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892116 kubelet[2031]: I0702 07:58:16.891809 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scg69\" (UniqueName: \"kubernetes.io/projected/8bb0cda0-286b-43a6-8c07-91eb35df53bc-kube-api-access-scg69\") pod \"csi-node-driver-kvxbz\" (UID: \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\") " pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:16.892116 kubelet[2031]: I0702 07:58:16.891839 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-52wsf\" (UniqueName: \"kubernetes.io/projected/4124a53b-b6f8-452b-9402-75958d6e9af7-kube-api-access-52wsf\") pod \"kube-proxy-45wvq\" (UID: \"4124a53b-b6f8-452b-9402-75958d6e9af7\") " pod="kube-system/kube-proxy-45wvq" Jul 2 07:58:16.892116 kubelet[2031]: I0702 07:58:16.891881 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-var-run-calico\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892116 kubelet[2031]: I0702 07:58:16.891915 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8fcrn\" (UniqueName: \"kubernetes.io/projected/520bf8b8-5572-45b3-9b6a-f67fd55935d7-kube-api-access-8fcrn\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892116 kubelet[2031]: I0702 07:58:16.891950 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8bb0cda0-286b-43a6-8c07-91eb35df53bc-socket-dir\") pod \"csi-node-driver-kvxbz\" (UID: \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\") " pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:16.892317 kubelet[2031]: I0702 07:58:16.891981 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-xtables-lock\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892317 kubelet[2031]: I0702 07:58:16.892015 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/520bf8b8-5572-45b3-9b6a-f67fd55935d7-tigera-ca-bundle\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892317 kubelet[2031]: I0702 07:58:16.892043 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-var-lib-calico\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892317 kubelet[2031]: I0702 07:58:16.892075 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/520bf8b8-5572-45b3-9b6a-f67fd55935d7-flexvol-driver-host\") pod \"calico-node-nkmh7\" (UID: \"520bf8b8-5572-45b3-9b6a-f67fd55935d7\") " pod="calico-system/calico-node-nkmh7" Jul 2 07:58:16.892317 kubelet[2031]: I0702 07:58:16.892104 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8bb0cda0-286b-43a6-8c07-91eb35df53bc-kubelet-dir\") pod \"csi-node-driver-kvxbz\" (UID: \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\") " pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:16.914485 systemd[1]: Created slice kubepods-besteffort-pod520bf8b8_5572_45b3_9b6a_f67fd55935d7.slice. Jul 2 07:58:17.003021 kubelet[2031]: E0702 07:58:17.002992 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:17.003021 kubelet[2031]: W0702 07:58:17.003013 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:17.003194 kubelet[2031]: E0702 07:58:17.003039 2031 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:17.016760 kubelet[2031]: E0702 07:58:17.016735 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:17.016919 kubelet[2031]: W0702 07:58:17.016903 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:17.017001 kubelet[2031]: E0702 07:58:17.016992 2031 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:17.033608 kubelet[2031]: E0702 07:58:17.033583 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:17.033608 kubelet[2031]: W0702 07:58:17.033601 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:17.033608 kubelet[2031]: E0702 07:58:17.033664 2031 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:17.034000 kubelet[2031]: E0702 07:58:17.033932 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:17.034000 kubelet[2031]: W0702 07:58:17.033942 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:17.034000 kubelet[2031]: E0702 07:58:17.033962 2031 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:17.213744 env[1654]: time="2024-07-02T07:58:17.213597922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-45wvq,Uid:4124a53b-b6f8-452b-9402-75958d6e9af7,Namespace:kube-system,Attempt:0,}" Jul 2 07:58:17.231175 env[1654]: time="2024-07-02T07:58:17.231133098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nkmh7,Uid:520bf8b8-5572-45b3-9b6a-f67fd55935d7,Namespace:calico-system,Attempt:0,}" Jul 2 07:58:17.778488 env[1654]: time="2024-07-02T07:58:17.778433253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.779919 env[1654]: time="2024-07-02T07:58:17.779882280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.784854 env[1654]: time="2024-07-02T07:58:17.784808700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.785820 env[1654]: time="2024-07-02T07:58:17.785783485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.786971 env[1654]: time="2024-07-02T07:58:17.786940945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.789088 env[1654]: time="2024-07-02T07:58:17.789051044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.790419 env[1654]: time="2024-07-02T07:58:17.790381404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.793866 env[1654]: time="2024-07-02T07:58:17.793826621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.823116597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.823164588Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.823183044Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.823325202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0 pid=2091 runtime=io.containerd.runc.v2 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.824959681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.824994429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.825004825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:17.829848 env[1654]: time="2024-07-02T07:58:17.825163514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c337cc566a0872795f0192ec4b4d14f33aea4ff4b562de185c81ff72f62f51a pid=2099 runtime=io.containerd.runc.v2 Jul 2 07:58:17.854300 systemd[1]: Started cri-containerd-8c337cc566a0872795f0192ec4b4d14f33aea4ff4b562de185c81ff72f62f51a.scope. Jul 2 07:58:17.863198 systemd[1]: Started cri-containerd-b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0.scope. Jul 2 07:58:17.866243 kubelet[2031]: E0702 07:58:17.865747 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.892680 kernel: audit: type=1400 audit(1719907097.881:458): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.892794 kernel: audit: type=1400 audit(1719907097.881:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897766 kernel: audit: type=1400 audit(1719907097.881:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.902912 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:17.903008 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.881000 audit: BPF prog-id=67 op=LOAD Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2099 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333337636335363661303837323739356630313932656334623464 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2099 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333337636335363661303837323739356630313932656334623464 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.888000 audit: BPF prog-id=68 op=LOAD Jul 2 07:58:17.888000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000221080 items=0 ppid=2099 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333337636335363661303837323739356630313932656334623464 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit: BPF prog-id=69 op=LOAD Jul 2 07:58:17.897000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002210c8 items=0 ppid=2099 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333337636335363661303837323739356630313932656334623464 Jul 2 07:58:17.897000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:58:17.897000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.897000 audit: BPF prog-id=70 op=LOAD Jul 2 07:58:17.897000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002214d8 items=0 ppid=2099 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333337636335363661303837323739356630313932656334623464 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:17.931354 env[1654]: time="2024-07-02T07:58:17.931308765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nkmh7,Uid:520bf8b8-5572-45b3-9b6a-f67fd55935d7,Namespace:calico-system,Attempt:0,} returns sandbox id \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\"" Jul 2 07:58:17.936376 env[1654]: time="2024-07-02T07:58:17.936328633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:58:17.938987 env[1654]: time="2024-07-02T07:58:17.938956340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-45wvq,Uid:4124a53b-b6f8-452b-9402-75958d6e9af7,Namespace:kube-system,Attempt:0,} returns sandbox id \"8c337cc566a0872795f0192ec4b4d14f33aea4ff4b562de185c81ff72f62f51a\"" Jul 2 07:58:18.003144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3063691138.mount: Deactivated successfully. Jul 2 07:58:18.179325 kubelet[2031]: E0702 07:58:18.176642 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:18.866488 kubelet[2031]: E0702 07:58:18.866445 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:19.222128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1882738410.mount: Deactivated successfully. Jul 2 07:58:19.372857 env[1654]: time="2024-07-02T07:58:19.372800426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.375924 env[1654]: time="2024-07-02T07:58:19.375877890Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.378553 env[1654]: time="2024-07-02T07:58:19.378494069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.382087 env[1654]: time="2024-07-02T07:58:19.382035681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:19.382534 env[1654]: time="2024-07-02T07:58:19.382496702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:58:19.384961 env[1654]: time="2024-07-02T07:58:19.384268679Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 07:58:19.385438 env[1654]: time="2024-07-02T07:58:19.385395959Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:58:19.406525 env[1654]: time="2024-07-02T07:58:19.406473769Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16\"" Jul 2 07:58:19.407414 env[1654]: time="2024-07-02T07:58:19.407375778Z" level=info msg="StartContainer for \"3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16\"" Jul 2 07:58:19.435773 systemd[1]: Started cri-containerd-3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16.scope. Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f96d60bac68 items=0 ppid=2091 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343366333762646335366539653062656261346337363139353538 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.452000 audit: BPF prog-id=75 op=LOAD Jul 2 07:58:19.452000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000099c98 items=0 ppid=2091 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343366333762646335366539653062656261346337363139353538 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit: BPF prog-id=76 op=LOAD Jul 2 07:58:19.453000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000099ce8 items=0 ppid=2091 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343366333762646335366539653062656261346337363139353538 Jul 2 07:58:19.453000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:58:19.453000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:19.453000 audit: BPF prog-id=77 op=LOAD Jul 2 07:58:19.453000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000099d78 items=0 ppid=2091 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:19.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343366333762646335366539653062656261346337363139353538 Jul 2 07:58:19.471898 env[1654]: time="2024-07-02T07:58:19.471847765Z" level=info msg="StartContainer for \"3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16\" returns successfully" Jul 2 07:58:19.483499 systemd[1]: cri-containerd-3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16.scope: Deactivated successfully. Jul 2 07:58:19.486000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:58:19.597263 env[1654]: time="2024-07-02T07:58:19.597204213Z" level=info msg="shim disconnected" id=3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16 Jul 2 07:58:19.597263 env[1654]: time="2024-07-02T07:58:19.597262323Z" level=warning msg="cleaning up after shim disconnected" id=3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16 namespace=k8s.io Jul 2 07:58:19.597738 env[1654]: time="2024-07-02T07:58:19.597274940Z" level=info msg="cleaning up dead shim" Jul 2 07:58:19.607297 env[1654]: time="2024-07-02T07:58:19.607243577Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:58:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2211 runtime=io.containerd.runc.v2\n" Jul 2 07:58:19.867479 kubelet[2031]: E0702 07:58:19.867346 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:20.098597 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3b43f37bdc56e9e0beba4c76195585ba3a5571a23258a09da97cf41c5d777e16-rootfs.mount: Deactivated successfully. Jul 2 07:58:20.181892 kubelet[2031]: E0702 07:58:20.181482 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:20.720258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2080754798.mount: Deactivated successfully. Jul 2 07:58:20.867542 kubelet[2031]: E0702 07:58:20.867481 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:21.644905 env[1654]: time="2024-07-02T07:58:21.644835876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.648523 env[1654]: time="2024-07-02T07:58:21.648478623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.650494 env[1654]: time="2024-07-02T07:58:21.650455046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.652647 env[1654]: time="2024-07-02T07:58:21.652590552Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:21.652993 env[1654]: time="2024-07-02T07:58:21.652953871Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\"" Jul 2 07:58:21.655065 env[1654]: time="2024-07-02T07:58:21.655023290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:58:21.658073 env[1654]: time="2024-07-02T07:58:21.658032626Z" level=info msg="CreateContainer within sandbox \"8c337cc566a0872795f0192ec4b4d14f33aea4ff4b562de185c81ff72f62f51a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:58:21.687735 env[1654]: time="2024-07-02T07:58:21.687694951Z" level=info msg="CreateContainer within sandbox \"8c337cc566a0872795f0192ec4b4d14f33aea4ff4b562de185c81ff72f62f51a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"953e94f7fd6aeb732e3d26dd98d848d584076a67e8408db096ce3e149417fb31\"" Jul 2 07:58:21.688484 env[1654]: time="2024-07-02T07:58:21.688441968Z" level=info msg="StartContainer for \"953e94f7fd6aeb732e3d26dd98d848d584076a67e8408db096ce3e149417fb31\"" Jul 2 07:58:21.745006 systemd[1]: Started cri-containerd-953e94f7fd6aeb732e3d26dd98d848d584076a67e8408db096ce3e149417fb31.scope. Jul 2 07:58:21.768000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.770750 kernel: kauditd_printk_skb: 223 callbacks suppressed Jul 2 07:58:21.770881 kernel: audit: type=1400 audit(1719907101.768:490): avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.787234 kernel: audit: type=1300 audit(1719907101.768:490): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa1384e34f8 items=0 ppid=2099 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.768000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa1384e34f8 items=0 ppid=2099 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935336539346637666436616562373332653364323664643938643834 Jul 2 07:58:21.795678 kernel: audit: type=1327 audit(1719907101.768:490): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935336539346637666436616562373332653364323664643938643834 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.802384 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.815064 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.815194 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.826778 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.845299 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.845441 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.851563 env[1654]: time="2024-07-02T07:58:21.851475954Z" level=info msg="StartContainer for \"953e94f7fd6aeb732e3d26dd98d848d584076a67e8408db096ce3e149417fb31\" returns successfully" Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.769000 audit: BPF prog-id=78 op=LOAD Jul 2 07:58:21.769000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000339ee8 items=0 ppid=2099 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935336539346637666436616562373332653364323664643938643834 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.860644 kernel: audit: type=1400 audit(1719907101.769:491): avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.776000 audit: BPF prog-id=79 op=LOAD Jul 2 07:58:21.776000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000339f38 items=0 ppid=2099 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935336539346637666436616562373332653364323664643938643834 Jul 2 07:58:21.786000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:58:21.786000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:21.786000 audit: BPF prog-id=80 op=LOAD Jul 2 07:58:21.786000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000339fc8 items=0 ppid=2099 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935336539346637666436616562373332653364323664643938643834 Jul 2 07:58:21.867966 kubelet[2031]: E0702 07:58:21.867914 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:21.976000 audit[2288]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:21.976000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0cb81fb0 a2=0 a3=7fff0cb81f9c items=0 ppid=2247 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:58:21.978000 audit[2289]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:21.978000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8b8abe0 a2=0 a3=7fffc8b8abcc items=0 ppid=2247 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:58:21.980000 audit[2291]: NETFILTER_CFG table=filter:16 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:21.980000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff71b8e8c0 a2=0 a3=7fff71b8e8ac items=0 ppid=2247 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:58:21.980000 audit[2290]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:21.980000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0ab067d0 a2=0 a3=52c7e68b6bfd802c items=0 ppid=2247 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:58:21.983000 audit[2292]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:21.983000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26aa49f0 a2=0 a3=7ffd26aa49dc items=0 ppid=2247 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:58:21.986000 audit[2293]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:21.986000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5c41df20 a2=0 a3=7ffc5c41df0c items=0 ppid=2247 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:21.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:58:22.076000 audit[2294]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.076000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd111aa9a0 a2=0 a3=7ffd111aa98c items=0 ppid=2247 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:58:22.080000 audit[2296]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.080000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2c71b2e0 a2=0 a3=7ffc2c71b2cc items=0 ppid=2247 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:58:22.085000 audit[2299]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.085000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc1dc5850 a2=0 a3=7fffc1dc583c items=0 ppid=2247 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:58:22.088000 audit[2300]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.088000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf43b330 a2=0 a3=7fffaf43b31c items=0 ppid=2247 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:58:22.092000 audit[2302]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.092000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed991f220 a2=0 a3=7ffed991f20c items=0 ppid=2247 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:58:22.093000 audit[2303]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.093000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e238f30 a2=0 a3=7ffc0e238f1c items=0 ppid=2247 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:58:22.098000 audit[2305]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.098000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff94f2f780 a2=0 a3=7fff94f2f76c items=0 ppid=2247 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:58:22.104000 audit[2308]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.104000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5527d5e0 a2=0 a3=7ffe5527d5cc items=0 ppid=2247 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:58:22.105000 audit[2309]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.105000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda170150 a2=0 a3=7ffcda17013c items=0 ppid=2247 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:58:22.109000 audit[2311]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.109000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9a2a1f70 a2=0 a3=7ffe9a2a1f5c items=0 ppid=2247 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:58:22.111000 audit[2312]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.111000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdea0bfe90 a2=0 a3=7ffdea0bfe7c items=0 ppid=2247 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:58:22.115000 audit[2314]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.115000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd42a32af0 a2=0 a3=7ffd42a32adc items=0 ppid=2247 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:22.121000 audit[2317]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.121000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc02274110 a2=0 a3=7ffc022740fc items=0 ppid=2247 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:22.129000 audit[2320]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.129000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6af1d4f0 a2=0 a3=7ffe6af1d4dc items=0 ppid=2247 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:58:22.131000 audit[2321]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.131000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf4da1460 a2=0 a3=7ffdf4da144c items=0 ppid=2247 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:58:22.177720 kubelet[2031]: E0702 07:58:22.177281 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:22.136000 audit[2323]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.136000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffb77f9ae0 a2=0 a3=7fffb77f9acc items=0 ppid=2247 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:22.183000 audit[2328]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.183000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe11909e30 a2=0 a3=7ffe11909e1c items=0 ppid=2247 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:22.184000 audit[2329]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.184000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc59557da0 a2=0 a3=7ffc59557d8c items=0 ppid=2247 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:58:22.189000 audit[2331]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:22.189000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe9df8a870 a2=0 a3=7ffe9df8a85c items=0 ppid=2247 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:58:22.207000 audit[2337]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:22.207000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffecd5f43c0 a2=0 a3=7ffecd5f43ac items=0 ppid=2247 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:22.240987 kubelet[2031]: I0702 07:58:22.236001 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-45wvq" podStartSLOduration=2.525056114 podCreationTimestamp="2024-07-02 07:58:16 +0000 UTC" firstStartedPulling="2024-07-02 07:58:17.942704371 +0000 UTC m=+3.866655470" lastFinishedPulling="2024-07-02 07:58:21.653565452 +0000 UTC m=+7.577516553" observedRunningTime="2024-07-02 07:58:22.23534048 +0000 UTC m=+8.159291595" watchObservedRunningTime="2024-07-02 07:58:22.235917197 +0000 UTC m=+8.159868311" Jul 2 07:58:22.248000 audit[2337]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:22.248000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffecd5f43c0 a2=0 a3=7ffecd5f43ac items=0 ppid=2247 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:22.277000 audit[2345]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.277000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcaa6f0b80 a2=0 a3=7ffcaa6f0b6c items=0 ppid=2247 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:58:22.284000 audit[2347]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.284000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffafc7e7a0 a2=0 a3=7fffafc7e78c items=0 ppid=2247 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:58:22.291000 audit[2350]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.291000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0ddeae00 a2=0 a3=7ffd0ddeadec items=0 ppid=2247 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:58:22.293000 audit[2351]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.293000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86c1feb0 a2=0 a3=7ffc86c1fe9c items=0 ppid=2247 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:58:22.296000 audit[2353]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.296000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1400c4f0 a2=0 a3=7ffe1400c4dc items=0 ppid=2247 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:58:22.300000 audit[2354]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.300000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8cf9f060 a2=0 a3=7fff8cf9f04c items=0 ppid=2247 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:58:22.305000 audit[2356]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.305000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff83df51e0 a2=0 a3=7fff83df51cc items=0 ppid=2247 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:58:22.313000 audit[2359]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.313000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffef28ba8a0 a2=0 a3=7ffef28ba88c items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:58:22.315000 audit[2360]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.315000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc3a792b0 a2=0 a3=7ffcc3a7929c items=0 ppid=2247 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:58:22.319000 audit[2362]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.319000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe7eda3c0 a2=0 a3=7fffe7eda3ac items=0 ppid=2247 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:58:22.322000 audit[2363]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.322000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe812db5c0 a2=0 a3=7ffe812db5ac items=0 ppid=2247 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:58:22.327000 audit[2365]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.327000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff76769c40 a2=0 a3=7fff76769c2c items=0 ppid=2247 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:22.336000 audit[2368]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.336000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc68735b30 a2=0 a3=7ffc68735b1c items=0 ppid=2247 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:58:22.343000 audit[2371]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.343000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbccda880 a2=0 a3=7fffbccda86c items=0 ppid=2247 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:58:22.345000 audit[2372]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.345000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9397fa70 a2=0 a3=7ffc9397fa5c items=0 ppid=2247 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:58:22.350000 audit[2374]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.350000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffff1149020 a2=0 a3=7ffff114900c items=0 ppid=2247 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:22.357000 audit[2377]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.357000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb40e4940 a2=0 a3=7ffcb40e492c items=0 ppid=2247 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:22.361000 audit[2378]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.361000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe90b2ba80 a2=0 a3=7ffe90b2ba6c items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:58:22.371000 audit[2380]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.371000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffecf8ce560 a2=0 a3=7ffecf8ce54c items=0 ppid=2247 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:58:22.375000 audit[2381]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.375000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe815886f0 a2=0 a3=7ffe815886dc items=0 ppid=2247 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:58:22.381000 audit[2383]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.381000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2e93eb70 a2=0 a3=7ffd2e93eb5c items=0 ppid=2247 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:22.388000 audit[2386]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:22.388000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4eb2e540 a2=0 a3=7ffd4eb2e52c items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:22.394000 audit[2388]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:58:22.394000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffcb9bb260 a2=0 a3=7fffcb9bb24c items=0 ppid=2247 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.394000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:22.396000 audit[2388]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:58:22.396000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffcb9bb260 a2=0 a3=7fffcb9bb24c items=0 ppid=2247 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:22.396000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:22.868383 kubelet[2031]: E0702 07:58:22.868242 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:23.869257 kubelet[2031]: E0702 07:58:23.869196 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:24.177259 kubelet[2031]: E0702 07:58:24.176896 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:24.870174 kubelet[2031]: E0702 07:58:24.870094 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:25.871289 kubelet[2031]: E0702 07:58:25.871239 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:26.136407 env[1654]: time="2024-07-02T07:58:26.136047934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:26.140924 env[1654]: time="2024-07-02T07:58:26.140870968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:26.143560 env[1654]: time="2024-07-02T07:58:26.143517040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:26.145734 env[1654]: time="2024-07-02T07:58:26.145690763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:26.146272 env[1654]: time="2024-07-02T07:58:26.146233659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:58:26.150988 env[1654]: time="2024-07-02T07:58:26.150942982Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:58:26.176876 kubelet[2031]: E0702 07:58:26.176682 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:26.181346 env[1654]: time="2024-07-02T07:58:26.181288267Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3\"" Jul 2 07:58:26.182280 env[1654]: time="2024-07-02T07:58:26.182237971Z" level=info msg="StartContainer for \"02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3\"" Jul 2 07:58:26.213797 systemd[1]: Started cri-containerd-02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3.scope. Jul 2 07:58:26.230000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.230000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f77ca655ca8 items=0 ppid=2091 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:26.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646265383639383564663363653765366131363739356462643366 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.231000 audit: BPF prog-id=81 op=LOAD Jul 2 07:58:26.231000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00027dfa8 items=0 ppid=2091 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:26.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646265383639383564663363653765366131363739356462643366 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.232000 audit: BPF prog-id=82 op=LOAD Jul 2 07:58:26.232000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00027dff8 items=0 ppid=2091 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:26.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646265383639383564663363653765366131363739356462643366 Jul 2 07:58:26.235000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:58:26.235000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:26.235000 audit: BPF prog-id=83 op=LOAD Jul 2 07:58:26.235000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003de088 items=0 ppid=2091 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:26.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646265383639383564663363653765366131363739356462643366 Jul 2 07:58:26.256274 env[1654]: time="2024-07-02T07:58:26.256188689Z" level=info msg="StartContainer for \"02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3\" returns successfully" Jul 2 07:58:26.872196 kubelet[2031]: E0702 07:58:26.872152 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:27.386437 env[1654]: time="2024-07-02T07:58:27.386352574Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:58:27.395976 systemd[1]: cri-containerd-02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3.scope: Deactivated successfully. Jul 2 07:58:27.409047 kernel: kauditd_printk_skb: 229 callbacks suppressed Jul 2 07:58:27.409191 kernel: audit: type=1334 audit(1719907107.403:553): prog-id=83 op=UNLOAD Jul 2 07:58:27.403000 audit: BPF prog-id=83 op=UNLOAD Jul 2 07:58:27.432709 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3-rootfs.mount: Deactivated successfully. Jul 2 07:58:27.462672 kubelet[2031]: I0702 07:58:27.461981 2031 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 07:58:27.874086 kubelet[2031]: E0702 07:58:27.874042 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:28.010701 env[1654]: time="2024-07-02T07:58:28.010569983Z" level=info msg="shim disconnected" id=02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3 Jul 2 07:58:28.010701 env[1654]: time="2024-07-02T07:58:28.010638760Z" level=warning msg="cleaning up after shim disconnected" id=02dbe86985df3ce7e6a16795dbd3f3374f87e718011a5ef4927798a95ea822e3 namespace=k8s.io Jul 2 07:58:28.010701 env[1654]: time="2024-07-02T07:58:28.010707374Z" level=info msg="cleaning up dead shim" Jul 2 07:58:28.024186 env[1654]: time="2024-07-02T07:58:28.024127280Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:58:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2438 runtime=io.containerd.runc.v2\n" Jul 2 07:58:28.184572 systemd[1]: Created slice kubepods-besteffort-pod8bb0cda0_286b_43a6_8c07_91eb35df53bc.slice. Jul 2 07:58:28.188803 env[1654]: time="2024-07-02T07:58:28.188747596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kvxbz,Uid:8bb0cda0-286b-43a6-8c07-91eb35df53bc,Namespace:calico-system,Attempt:0,}" Jul 2 07:58:28.238592 env[1654]: time="2024-07-02T07:58:28.238437145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:58:28.310338 env[1654]: time="2024-07-02T07:58:28.310256619Z" level=error msg="Failed to destroy network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:28.317034 env[1654]: time="2024-07-02T07:58:28.316383507Z" level=error msg="encountered an error cleaning up failed sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:28.317034 env[1654]: time="2024-07-02T07:58:28.316473696Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kvxbz,Uid:8bb0cda0-286b-43a6-8c07-91eb35df53bc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:28.315326 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693-shm.mount: Deactivated successfully. Jul 2 07:58:28.317371 kubelet[2031]: E0702 07:58:28.317338 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:28.317469 kubelet[2031]: E0702 07:58:28.317434 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:28.317522 kubelet[2031]: E0702 07:58:28.317480 2031 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kvxbz" Jul 2 07:58:28.317576 kubelet[2031]: E0702 07:58:28.317566 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kvxbz_calico-system(8bb0cda0-286b-43a6-8c07-91eb35df53bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kvxbz_calico-system(8bb0cda0-286b-43a6-8c07-91eb35df53bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:28.874967 kubelet[2031]: E0702 07:58:28.874915 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:29.246091 kubelet[2031]: I0702 07:58:29.244921 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:29.247566 env[1654]: time="2024-07-02T07:58:29.247520165Z" level=info msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" Jul 2 07:58:29.341361 env[1654]: time="2024-07-02T07:58:29.341270629Z" level=error msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" failed" error="failed to destroy network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:29.342328 kubelet[2031]: E0702 07:58:29.342104 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:29.342328 kubelet[2031]: E0702 07:58:29.342189 2031 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693"} Jul 2 07:58:29.342328 kubelet[2031]: E0702 07:58:29.342244 2031 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:58:29.342328 kubelet[2031]: E0702 07:58:29.342287 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8bb0cda0-286b-43a6-8c07-91eb35df53bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kvxbz" podUID="8bb0cda0-286b-43a6-8c07-91eb35df53bc" Jul 2 07:58:29.876304 kubelet[2031]: E0702 07:58:29.876241 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:29.917209 kubelet[2031]: I0702 07:58:29.914331 2031 topology_manager.go:215] "Topology Admit Handler" podUID="012517ed-475a-41e4-94e8-bd4f9efe9c72" podNamespace="default" podName="nginx-deployment-6d5f899847-lhbhd" Jul 2 07:58:29.925068 systemd[1]: Created slice kubepods-besteffort-pod012517ed_475a_41e4_94e8_bd4f9efe9c72.slice. Jul 2 07:58:30.097742 kubelet[2031]: I0702 07:58:30.097604 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xhn25\" (UniqueName: \"kubernetes.io/projected/012517ed-475a-41e4-94e8-bd4f9efe9c72-kube-api-access-xhn25\") pod \"nginx-deployment-6d5f899847-lhbhd\" (UID: \"012517ed-475a-41e4-94e8-bd4f9efe9c72\") " pod="default/nginx-deployment-6d5f899847-lhbhd" Jul 2 07:58:30.232912 env[1654]: time="2024-07-02T07:58:30.232862114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-lhbhd,Uid:012517ed-475a-41e4-94e8-bd4f9efe9c72,Namespace:default,Attempt:0,}" Jul 2 07:58:30.696861 env[1654]: time="2024-07-02T07:58:30.696369805Z" level=error msg="Failed to destroy network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:30.700727 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5-shm.mount: Deactivated successfully. Jul 2 07:58:30.703612 env[1654]: time="2024-07-02T07:58:30.703545009Z" level=error msg="encountered an error cleaning up failed sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:30.703744 env[1654]: time="2024-07-02T07:58:30.703659702Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-lhbhd,Uid:012517ed-475a-41e4-94e8-bd4f9efe9c72,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:30.703944 kubelet[2031]: E0702 07:58:30.703922 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:30.704048 kubelet[2031]: E0702 07:58:30.704032 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-lhbhd" Jul 2 07:58:30.704108 kubelet[2031]: E0702 07:58:30.704069 2031 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-lhbhd" Jul 2 07:58:30.704166 kubelet[2031]: E0702 07:58:30.704140 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-lhbhd_default(012517ed-475a-41e4-94e8-bd4f9efe9c72)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-lhbhd_default(012517ed-475a-41e4-94e8-bd4f9efe9c72)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-lhbhd" podUID="012517ed-475a-41e4-94e8-bd4f9efe9c72" Jul 2 07:58:30.876438 kubelet[2031]: E0702 07:58:30.876397 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:30.940058 kernel: audit: type=1131 audit(1719907110.931:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:30.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:30.932120 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:58:30.955000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:58:30.955000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:58:30.960274 kernel: audit: type=1334 audit(1719907110.955:555): prog-id=65 op=UNLOAD Jul 2 07:58:30.960381 kernel: audit: type=1334 audit(1719907110.955:556): prog-id=64 op=UNLOAD Jul 2 07:58:30.960415 kernel: audit: type=1334 audit(1719907110.955:557): prog-id=63 op=UNLOAD Jul 2 07:58:30.955000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:58:31.249690 kubelet[2031]: I0702 07:58:31.249575 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:31.250929 env[1654]: time="2024-07-02T07:58:31.250888998Z" level=info msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" Jul 2 07:58:31.309386 env[1654]: time="2024-07-02T07:58:31.309319194Z" level=error msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" failed" error="failed to destroy network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:31.309683 kubelet[2031]: E0702 07:58:31.309662 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:31.309792 kubelet[2031]: E0702 07:58:31.309730 2031 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5"} Jul 2 07:58:31.309847 kubelet[2031]: E0702 07:58:31.309807 2031 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"012517ed-475a-41e4-94e8-bd4f9efe9c72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:58:31.309937 kubelet[2031]: E0702 07:58:31.309860 2031 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"012517ed-475a-41e4-94e8-bd4f9efe9c72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-lhbhd" podUID="012517ed-475a-41e4-94e8-bd4f9efe9c72" Jul 2 07:58:31.876707 kubelet[2031]: E0702 07:58:31.876569 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:32.877441 kubelet[2031]: E0702 07:58:32.877351 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:33.878805 kubelet[2031]: E0702 07:58:33.878706 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:34.861407 kubelet[2031]: E0702 07:58:34.861326 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:34.879652 kubelet[2031]: E0702 07:58:34.879594 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.881114 kubelet[2031]: E0702 07:58:35.881050 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.892902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2712262596.mount: Deactivated successfully. Jul 2 07:58:35.932589 env[1654]: time="2024-07-02T07:58:35.932537528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.936002 env[1654]: time="2024-07-02T07:58:35.935957445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.938573 env[1654]: time="2024-07-02T07:58:35.938529289Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.940810 env[1654]: time="2024-07-02T07:58:35.940769169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.941164 env[1654]: time="2024-07-02T07:58:35.941126775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:58:35.958546 env[1654]: time="2024-07-02T07:58:35.953346494Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:58:35.987657 env[1654]: time="2024-07-02T07:58:35.987507110Z" level=info msg="CreateContainer within sandbox \"b78ed90fa1dd4a37920fff16a0542e0b0a09d7cb9d65f6532204b075b99d00d0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab\"" Jul 2 07:58:35.988346 env[1654]: time="2024-07-02T07:58:35.988304508Z" level=info msg="StartContainer for \"777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab\"" Jul 2 07:58:36.022706 systemd[1]: Started cri-containerd-777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab.scope. Jul 2 07:58:36.058422 kernel: audit: type=1400 audit(1719907116.044:558): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058591 kernel: audit: type=1300 audit(1719907116.044:558): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7cd9d13718 items=0 ppid=2091 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7cd9d13718 items=0 ppid=2091 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376435386265306465303937346436356437303065376333346233 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.070246 kernel: audit: type=1327 audit(1719907116.044:558): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376435386265306465303937346436356437303065376333346233 Jul 2 07:58:36.070318 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.074984 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.080737 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.086643 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.098529 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.102610 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.102713 kernel: audit: type=1400 audit(1719907116.044:559): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.044000 audit: BPF prog-id=84 op=LOAD Jul 2 07:58:36.044000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028b588 items=0 ppid=2091 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376435386265306465303937346436356437303065376333346233 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit: BPF prog-id=85 op=LOAD Jul 2 07:58:36.058000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028b5d8 items=0 ppid=2091 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376435386265306465303937346436356437303065376333346233 Jul 2 07:58:36.058000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:58:36.058000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.058000 audit: BPF prog-id=86 op=LOAD Jul 2 07:58:36.058000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028b668 items=0 ppid=2091 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376435386265306465303937346436356437303065376333346233 Jul 2 07:58:36.110818 env[1654]: time="2024-07-02T07:58:36.110772819Z" level=info msg="StartContainer for \"777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab\" returns successfully" Jul 2 07:58:36.254807 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:58:36.254964 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:58:36.881785 kubelet[2031]: E0702 07:58:36.881719 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:37.349971 systemd[1]: run-containerd-runc-k8s.io-777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab-runc.NelBXn.mount: Deactivated successfully. Jul 2 07:58:37.691000 audit[2712]: AVC avc: denied { write } for pid=2712 comm="tee" name="fd" dev="proc" ino=19067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.691000 audit[2712]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7b9a9a10 a2=241 a3=1b6 items=1 ppid=2678 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.691000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:58:37.691000 audit: PATH item=0 name="/dev/fd/63" inode=20031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.695000 audit[2722]: AVC avc: denied { write } for pid=2722 comm="tee" name="fd" dev="proc" ino=19071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.695000 audit[2722]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6ee4fa21 a2=241 a3=1b6 items=1 ppid=2676 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.695000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:58:37.695000 audit: PATH item=0 name="/dev/fd/63" inode=20037 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.695000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.691000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.700000 audit[2720]: AVC avc: denied { write } for pid=2720 comm="tee" name="fd" dev="proc" ino=19075 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.700000 audit[2720]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb60f4a1f a2=241 a3=1b6 items=1 ppid=2679 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.700000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:58:37.700000 audit: PATH item=0 name="/dev/fd/63" inode=19064 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.719000 audit[2725]: AVC avc: denied { write } for pid=2725 comm="tee" name="fd" dev="proc" ino=20055 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.720000 audit[2718]: AVC avc: denied { write } for pid=2718 comm="tee" name="fd" dev="proc" ino=20056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.720000 audit[2718]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd34b5da1f a2=241 a3=1b6 items=1 ppid=2692 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.720000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:58:37.720000 audit: PATH item=0 name="/dev/fd/63" inode=20034 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.719000 audit[2725]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff76d90a20 a2=241 a3=1b6 items=1 ppid=2683 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.719000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:58:37.719000 audit: PATH item=0 name="/dev/fd/63" inode=20038 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.719000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.732000 audit[2744]: AVC avc: denied { write } for pid=2744 comm="tee" name="fd" dev="proc" ino=20063 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.732000 audit[2744]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9816ea0f a2=241 a3=1b6 items=1 ppid=2682 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.732000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:58:37.732000 audit: PATH item=0 name="/dev/fd/63" inode=20045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.742000 audit[2748]: AVC avc: denied { write } for pid=2748 comm="tee" name="fd" dev="proc" ino=20067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:37.742000 audit[2748]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9af45a1f a2=241 a3=1b6 items=1 ppid=2687 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:37.742000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:58:37.742000 audit: PATH item=0 name="/dev/fd/63" inode=20048 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:37.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:37.882342 kubelet[2031]: E0702 07:58:37.882288 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:38.078718 kernel: Initializing XFRM netlink socket Jul 2 07:58:38.204400 (udev-worker)[2601]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:58:38.248836 systemd-networkd[1374]: vxlan.calico: Link UP Jul 2 07:58:38.248847 systemd-networkd[1374]: vxlan.calico: Gained carrier Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit: BPF prog-id=87 op=LOAD Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc62b086c0 a2=70 a3=7f36d626e000 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit: BPF prog-id=87 op=UNLOAD Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit: BPF prog-id=88 op=LOAD Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc62b086c0 a2=70 a3=6f items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit: BPF prog-id=88 op=UNLOAD Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc62b08670 a2=70 a3=7ffc62b086c0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit: BPF prog-id=89 op=LOAD Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc62b08650 a2=70 a3=7ffc62b086c0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit: BPF prog-id=89 op=UNLOAD Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc62b08730 a2=70 a3=0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc62b08720 a2=70 a3=0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.324000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.324000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc62b08690 a2=70 a3=0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc62b08760 a2=70 a3=2603a00 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc62b08760 a2=70 a3=2600880 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.326000 audit: BPF prog-id=90 op=LOAD Jul 2 07:58:38.326000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc62b08680 a2=70 a3=0 items=0 ppid=2695 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:38.335000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.335000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcacd41fa0 a2=70 a3=fff80800 items=0 ppid=2695 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.335000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:38.335000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:38.335000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcacd41e70 a2=70 a3=3 items=0 ppid=2695 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.335000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:38.322498 (udev-worker)[2602]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:58:38.343000 audit: BPF prog-id=90 op=UNLOAD Jul 2 07:58:38.446000 audit[2842]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:38.446000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc6866de70 a2=0 a3=7ffc6866de5c items=0 ppid=2695 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.446000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:38.453000 audit[2840]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:38.453000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe3c63f260 a2=0 a3=7ffe3c63f24c items=0 ppid=2695 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.453000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:38.455000 audit[2841]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:38.455000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe9955cf20 a2=0 a3=7ffe9955cf0c items=0 ppid=2695 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.455000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:38.470000 audit[2845]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:38.470000 audit[2845]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdcd184150 a2=0 a3=7ffdcd18413c items=0 ppid=2695 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:38.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:38.883345 kubelet[2031]: E0702 07:58:38.883292 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:39.023113 amazon-ssm-agent[1625]: 2024-07-02 07:58:39 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Jul 2 07:58:39.526854 systemd-networkd[1374]: vxlan.calico: Gained IPv6LL Jul 2 07:58:39.884334 kubelet[2031]: E0702 07:58:39.884135 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:40.885182 kubelet[2031]: E0702 07:58:40.885129 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:41.885722 kubelet[2031]: E0702 07:58:41.885667 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:42.177817 env[1654]: time="2024-07-02T07:58:42.177263741Z" level=info msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" Jul 2 07:58:42.306097 kubelet[2031]: I0702 07:58:42.305676 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-nkmh7" podStartSLOduration=8.299554635 podCreationTimestamp="2024-07-02 07:58:16 +0000 UTC" firstStartedPulling="2024-07-02 07:58:17.935414639 +0000 UTC m=+3.859365738" lastFinishedPulling="2024-07-02 07:58:35.941459349 +0000 UTC m=+21.865410453" observedRunningTime="2024-07-02 07:58:36.297778559 +0000 UTC m=+22.221729673" watchObservedRunningTime="2024-07-02 07:58:42.30559935 +0000 UTC m=+28.229550461" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.306 [INFO][2866] k8s.go 608: Cleaning up netns ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.307 [INFO][2866] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" iface="eth0" netns="/var/run/netns/cni-fc1f8194-6aea-8ac2-69ef-13446743b6b3" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.307 [INFO][2866] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" iface="eth0" netns="/var/run/netns/cni-fc1f8194-6aea-8ac2-69ef-13446743b6b3" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.308 [INFO][2866] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" iface="eth0" netns="/var/run/netns/cni-fc1f8194-6aea-8ac2-69ef-13446743b6b3" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.308 [INFO][2866] k8s.go 615: Releasing IP address(es) ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.308 [INFO][2866] utils.go 188: Calico CNI releasing IP address ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.398 [INFO][2872] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.399 [INFO][2872] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.399 [INFO][2872] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.414 [WARNING][2872] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.414 [INFO][2872] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.419 [INFO][2872] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:42.422390 env[1654]: 2024-07-02 07:58:42.421 [INFO][2866] k8s.go 621: Teardown processing complete. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:58:42.426827 env[1654]: time="2024-07-02T07:58:42.426775713Z" level=info msg="TearDown network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" successfully" Jul 2 07:58:42.427018 env[1654]: time="2024-07-02T07:58:42.426990081Z" level=info msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" returns successfully" Jul 2 07:58:42.431609 systemd[1]: run-netns-cni\x2dfc1f8194\x2d6aea\x2d8ac2\x2d69ef\x2d13446743b6b3.mount: Deactivated successfully. Jul 2 07:58:42.434391 env[1654]: time="2024-07-02T07:58:42.434347168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kvxbz,Uid:8bb0cda0-286b-43a6-8c07-91eb35df53bc,Namespace:calico-system,Attempt:1,}" Jul 2 07:58:42.710938 (udev-worker)[2897]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:58:42.712112 systemd-networkd[1374]: cali9f0d1f665fa: Link UP Jul 2 07:58:42.717002 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:42.717139 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f0d1f665fa: link becomes ready Jul 2 07:58:42.717338 systemd-networkd[1374]: cali9f0d1f665fa: Gained carrier Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.532 [INFO][2878] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.164-k8s-csi--node--driver--kvxbz-eth0 csi-node-driver- calico-system 8bb0cda0-286b-43a6-8c07-91eb35df53bc 944 0 2024-07-02 07:58:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.164 csi-node-driver-kvxbz eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9f0d1f665fa [] []}} ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.533 [INFO][2878] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.578 [INFO][2890] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" HandleID="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.605 [INFO][2890] ipam_plugin.go 264: Auto assigning IP ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" HandleID="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efc90), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.164", "pod":"csi-node-driver-kvxbz", "timestamp":"2024-07-02 07:58:42.577988373 +0000 UTC"}, Hostname:"172.31.22.164", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.605 [INFO][2890] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.605 [INFO][2890] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.605 [INFO][2890] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.164' Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.610 [INFO][2890] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.631 [INFO][2890] ipam.go 372: Looking up existing affinities for host host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.656 [INFO][2890] ipam.go 489: Trying affinity for 192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.674 [INFO][2890] ipam.go 155: Attempting to load block cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.679 [INFO][2890] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.680 [INFO][2890] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.50.128/26 handle="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.682 [INFO][2890] ipam.go 1685: Creating new handle: k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59 Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.691 [INFO][2890] ipam.go 1203: Writing block in order to claim IPs block=192.168.50.128/26 handle="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.700 [INFO][2890] ipam.go 1216: Successfully claimed IPs: [192.168.50.129/26] block=192.168.50.128/26 handle="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.700 [INFO][2890] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.50.129/26] handle="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" host="172.31.22.164" Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.700 [INFO][2890] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:42.737864 env[1654]: 2024-07-02 07:58:42.700 [INFO][2890] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.50.129/26] IPv6=[] ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" HandleID="k8s-pod-network.95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.705 [INFO][2878] k8s.go 386: Populated endpoint ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-csi--node--driver--kvxbz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8bb0cda0-286b-43a6-8c07-91eb35df53bc", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"", Pod:"csi-node-driver-kvxbz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9f0d1f665fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.705 [INFO][2878] k8s.go 387: Calico CNI using IPs: [192.168.50.129/32] ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.705 [INFO][2878] dataplane_linux.go 68: Setting the host side veth name to cali9f0d1f665fa ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.718 [INFO][2878] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.719 [INFO][2878] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-csi--node--driver--kvxbz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8bb0cda0-286b-43a6-8c07-91eb35df53bc", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59", Pod:"csi-node-driver-kvxbz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9f0d1f665fa", MAC:"de:4f:c8:dd:86:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:42.738873 env[1654]: 2024-07-02 07:58:42.733 [INFO][2878] k8s.go 500: Wrote updated endpoint to datastore ContainerID="95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59" Namespace="calico-system" Pod="csi-node-driver-kvxbz" WorkloadEndpoint="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:58:42.767000 audit[2911]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:42.769667 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 07:58:42.769788 kernel: audit: type=1325 audit(1719907122.767:591): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:42.806088 kernel: audit: type=1300 audit(1719907122.767:591): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcb81de970 a2=0 a3=7ffcb81de95c items=0 ppid=2695 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.767000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcb81de970 a2=0 a3=7ffcb81de95c items=0 ppid=2695 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:42.829159 kernel: audit: type=1327 audit(1719907122.767:591): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:42.837681 env[1654]: time="2024-07-02T07:58:42.837561718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:42.837681 env[1654]: time="2024-07-02T07:58:42.837615890Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:42.837932 env[1654]: time="2024-07-02T07:58:42.837648436Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:42.838031 env[1654]: time="2024-07-02T07:58:42.837975138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59 pid=2921 runtime=io.containerd.runc.v2 Jul 2 07:58:42.880074 systemd[1]: Started cri-containerd-95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59.scope. Jul 2 07:58:42.886982 kubelet[2031]: E0702 07:58:42.886937 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912748 kernel: audit: type=1400 audit(1719907122.896:592): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912890 kernel: audit: type=1400 audit(1719907122.896:593): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912939 kernel: audit: type=1400 audit(1719907122.896:594): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.921266 kernel: audit: type=1400 audit(1719907122.896:595): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.926229 kernel: audit: type=1400 audit(1719907122.896:596): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.931058 kernel: audit: type=1400 audit(1719907122.896:597): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.931195 kernel: audit: type=1400 audit(1719907122.896:598): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.897000 audit: BPF prog-id=91 op=LOAD Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663662323735353533306431303536623237363930653431613633 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663662323735353533306431303536623237363930653431613633 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.902000 audit: BPF prog-id=92 op=LOAD Jul 2 07:58:42.902000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000256e70 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663662323735353533306431303536623237363930653431613633 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit: BPF prog-id=93 op=LOAD Jul 2 07:58:42.912000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000256eb8 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663662323735353533306431303536623237363930653431613633 Jul 2 07:58:42.912000 audit: BPF prog-id=93 op=UNLOAD Jul 2 07:58:42.912000 audit: BPF prog-id=92 op=UNLOAD Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:42.912000 audit: BPF prog-id=94 op=LOAD Jul 2 07:58:42.912000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002572c8 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663662323735353533306431303536623237363930653431613633 Jul 2 07:58:42.949170 env[1654]: time="2024-07-02T07:58:42.949123736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kvxbz,Uid:8bb0cda0-286b-43a6-8c07-91eb35df53bc,Namespace:calico-system,Attempt:1,} returns sandbox id \"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59\"" Jul 2 07:58:42.951702 env[1654]: time="2024-07-02T07:58:42.951665292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:58:43.887721 kubelet[2031]: E0702 07:58:43.887682 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:44.391779 systemd-networkd[1374]: cali9f0d1f665fa: Gained IPv6LL Jul 2 07:58:44.461657 env[1654]: time="2024-07-02T07:58:44.437296016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:44.461657 env[1654]: time="2024-07-02T07:58:44.443360713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:44.461657 env[1654]: time="2024-07-02T07:58:44.447688506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:44.461657 env[1654]: time="2024-07-02T07:58:44.450849804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:44.461657 env[1654]: time="2024-07-02T07:58:44.451527008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:58:44.472462 env[1654]: time="2024-07-02T07:58:44.472398293Z" level=info msg="CreateContainer within sandbox \"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:58:44.518689 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4138431192.mount: Deactivated successfully. Jul 2 07:58:44.528394 env[1654]: time="2024-07-02T07:58:44.527576478Z" level=info msg="CreateContainer within sandbox \"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6a743d93af2a6f2c3bf284fed2995529a6beccd32f465147546499ca60f547d4\"" Jul 2 07:58:44.528894 env[1654]: time="2024-07-02T07:58:44.528704355Z" level=info msg="StartContainer for \"6a743d93af2a6f2c3bf284fed2995529a6beccd32f465147546499ca60f547d4\"" Jul 2 07:58:44.569326 systemd[1]: Started cri-containerd-6a743d93af2a6f2c3bf284fed2995529a6beccd32f465147546499ca60f547d4.scope. Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f34943fd968 items=0 ppid=2921 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:44.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373433643933616632613666326333626632383466656432393935 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit: BPF prog-id=95 op=LOAD Jul 2 07:58:44.590000 audit[2969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000432828 items=0 ppid=2921 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:44.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373433643933616632613666326333626632383466656432393935 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit: BPF prog-id=96 op=LOAD Jul 2 07:58:44.590000 audit[2969]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000432878 items=0 ppid=2921 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:44.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373433643933616632613666326333626632383466656432393935 Jul 2 07:58:44.590000 audit: BPF prog-id=96 op=UNLOAD Jul 2 07:58:44.590000 audit: BPF prog-id=95 op=UNLOAD Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:44.590000 audit: BPF prog-id=97 op=LOAD Jul 2 07:58:44.590000 audit[2969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000432908 items=0 ppid=2921 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:44.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373433643933616632613666326333626632383466656432393935 Jul 2 07:58:44.613603 env[1654]: time="2024-07-02T07:58:44.613548519Z" level=info msg="StartContainer for \"6a743d93af2a6f2c3bf284fed2995529a6beccd32f465147546499ca60f547d4\" returns successfully" Jul 2 07:58:44.615173 env[1654]: time="2024-07-02T07:58:44.615132724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:58:44.887874 kubelet[2031]: E0702 07:58:44.887832 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:45.178452 env[1654]: time="2024-07-02T07:58:45.178152635Z" level=info msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.338 [INFO][3013] k8s.go 608: Cleaning up netns ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.338 [INFO][3013] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" iface="eth0" netns="/var/run/netns/cni-2e584f79-d441-9d6e-06b0-b031d1a86aa1" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.342 [INFO][3013] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" iface="eth0" netns="/var/run/netns/cni-2e584f79-d441-9d6e-06b0-b031d1a86aa1" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.342 [INFO][3013] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" iface="eth0" netns="/var/run/netns/cni-2e584f79-d441-9d6e-06b0-b031d1a86aa1" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.342 [INFO][3013] k8s.go 615: Releasing IP address(es) ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.343 [INFO][3013] utils.go 188: Calico CNI releasing IP address ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.438 [INFO][3019] ipam_plugin.go 411: Releasing address using handleID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.438 [INFO][3019] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.439 [INFO][3019] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.448 [WARNING][3019] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.448 [INFO][3019] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.451 [INFO][3019] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:45.454221 env[1654]: 2024-07-02 07:58:45.452 [INFO][3013] k8s.go 621: Teardown processing complete. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:58:45.457767 env[1654]: time="2024-07-02T07:58:45.454418847Z" level=info msg="TearDown network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" successfully" Jul 2 07:58:45.457767 env[1654]: time="2024-07-02T07:58:45.454457324Z" level=info msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" returns successfully" Jul 2 07:58:45.458757 systemd[1]: run-netns-cni\x2d2e584f79\x2dd441\x2d9d6e\x2d06b0\x2db031d1a86aa1.mount: Deactivated successfully. Jul 2 07:58:45.459380 env[1654]: time="2024-07-02T07:58:45.459341277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-lhbhd,Uid:012517ed-475a-41e4-94e8-bd4f9efe9c72,Namespace:default,Attempt:1,}" Jul 2 07:58:45.849194 systemd-networkd[1374]: califdaec6b3914: Link UP Jul 2 07:58:45.855837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:45.856199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califdaec6b3914: link becomes ready Jul 2 07:58:45.856616 (udev-worker)[3044]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:58:45.856777 systemd-networkd[1374]: califdaec6b3914: Gained carrier Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.621 [INFO][3026] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0 nginx-deployment-6d5f899847- default 012517ed-475a-41e4-94e8-bd4f9efe9c72 958 0 2024-07-02 07:58:29 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.164 nginx-deployment-6d5f899847-lhbhd eth0 default [] [] [kns.default ksa.default.default] califdaec6b3914 [] []}} ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.622 [INFO][3026] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.713 [INFO][3037] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" HandleID="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.740 [INFO][3037] ipam_plugin.go 264: Auto assigning IP ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" HandleID="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050700), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.164", "pod":"nginx-deployment-6d5f899847-lhbhd", "timestamp":"2024-07-02 07:58:45.713460222 +0000 UTC"}, Hostname:"172.31.22.164", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.740 [INFO][3037] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.740 [INFO][3037] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.740 [INFO][3037] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.164' Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.744 [INFO][3037] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.764 [INFO][3037] ipam.go 372: Looking up existing affinities for host host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.781 [INFO][3037] ipam.go 489: Trying affinity for 192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.789 [INFO][3037] ipam.go 155: Attempting to load block cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.795 [INFO][3037] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.795 [INFO][3037] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.50.128/26 handle="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.805 [INFO][3037] ipam.go 1685: Creating new handle: k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227 Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.817 [INFO][3037] ipam.go 1203: Writing block in order to claim IPs block=192.168.50.128/26 handle="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.825 [INFO][3037] ipam.go 1216: Successfully claimed IPs: [192.168.50.130/26] block=192.168.50.128/26 handle="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.825 [INFO][3037] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.50.130/26] handle="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" host="172.31.22.164" Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.825 [INFO][3037] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:45.888123 env[1654]: 2024-07-02 07:58:45.825 [INFO][3037] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.50.130/26] IPv6=[] ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" HandleID="k8s-pod-network.f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.836 [INFO][3026] k8s.go 386: Populated endpoint ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"012517ed-475a-41e4-94e8-bd4f9efe9c72", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"", Pod:"nginx-deployment-6d5f899847-lhbhd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califdaec6b3914", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.836 [INFO][3026] k8s.go 387: Calico CNI using IPs: [192.168.50.130/32] ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.836 [INFO][3026] dataplane_linux.go 68: Setting the host side veth name to califdaec6b3914 ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.859 [INFO][3026] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.859 [INFO][3026] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"012517ed-475a-41e4-94e8-bd4f9efe9c72", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227", Pod:"nginx-deployment-6d5f899847-lhbhd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califdaec6b3914", MAC:"0a:02:7d:10:0d:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:45.889978 env[1654]: 2024-07-02 07:58:45.868 [INFO][3026] k8s.go 500: Wrote updated endpoint to datastore ContainerID="f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227" Namespace="default" Pod="nginx-deployment-6d5f899847-lhbhd" WorkloadEndpoint="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:58:45.890777 kubelet[2031]: E0702 07:58:45.888121 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:45.912000 audit[3054]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:45.912000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffea35a220 a2=0 a3=7fffea35a20c items=0 ppid=2695 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.912000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:45.957943 env[1654]: time="2024-07-02T07:58:45.957549735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:45.957943 env[1654]: time="2024-07-02T07:58:45.957601088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:45.957943 env[1654]: time="2024-07-02T07:58:45.957667228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:45.958232 env[1654]: time="2024-07-02T07:58:45.957987910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227 pid=3067 runtime=io.containerd.runc.v2 Jul 2 07:58:46.027021 systemd[1]: run-containerd-runc-k8s.io-f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227-runc.wvx6qH.mount: Deactivated successfully. Jul 2 07:58:46.038452 systemd[1]: Started cri-containerd-f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227.scope. Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.068000 audit: BPF prog-id=98 op=LOAD Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363335636536363565616337613863666136376333323039376661 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363335636536363565616337613863666136376333323039376661 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit: BPF prog-id=99 op=LOAD Jul 2 07:58:46.069000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003528e0 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363335636536363565616337613863666136376333323039376661 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.069000 audit: BPF prog-id=100 op=LOAD Jul 2 07:58:46.069000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000352928 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363335636536363565616337613863666136376333323039376661 Jul 2 07:58:46.069000 audit: BPF prog-id=100 op=UNLOAD Jul 2 07:58:46.069000 audit: BPF prog-id=99 op=UNLOAD Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.070000 audit: BPF prog-id=101 op=LOAD Jul 2 07:58:46.070000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000352d38 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363335636536363565616337613863666136376333323039376661 Jul 2 07:58:46.075922 update_engine[1637]: I0702 07:58:46.075196 1637 update_attempter.cc:509] Updating boot flags... Jul 2 07:58:46.275404 env[1654]: time="2024-07-02T07:58:46.248787717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-lhbhd,Uid:012517ed-475a-41e4-94e8-bd4f9efe9c72,Namespace:default,Attempt:1,} returns sandbox id \"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227\"" Jul 2 07:58:46.534441 env[1654]: time="2024-07-02T07:58:46.534185926Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:46.537722 env[1654]: time="2024-07-02T07:58:46.537681037Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:46.541238 env[1654]: time="2024-07-02T07:58:46.541178192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:46.544038 env[1654]: time="2024-07-02T07:58:46.543986288Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:46.544514 env[1654]: time="2024-07-02T07:58:46.544480083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:58:46.546890 env[1654]: time="2024-07-02T07:58:46.546275254Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:58:46.547152 env[1654]: time="2024-07-02T07:58:46.547119059Z" level=info msg="CreateContainer within sandbox \"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:58:46.572107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3283348887.mount: Deactivated successfully. Jul 2 07:58:46.578695 env[1654]: time="2024-07-02T07:58:46.578646225Z" level=info msg="CreateContainer within sandbox \"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f8e6d64340cf07f3886d4c61e1e7bd9019901bed13f9f527ef8fd215fac17b1b\"" Jul 2 07:58:46.579613 env[1654]: time="2024-07-02T07:58:46.579577189Z" level=info msg="StartContainer for \"f8e6d64340cf07f3886d4c61e1e7bd9019901bed13f9f527ef8fd215fac17b1b\"" Jul 2 07:58:46.624312 systemd[1]: run-containerd-runc-k8s.io-f8e6d64340cf07f3886d4c61e1e7bd9019901bed13f9f527ef8fd215fac17b1b-runc.TuCf30.mount: Deactivated successfully. Jul 2 07:58:46.631844 systemd[1]: Started cri-containerd-f8e6d64340cf07f3886d4c61e1e7bd9019901bed13f9f527ef8fd215fac17b1b.scope. Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe40483e718 items=0 ppid=2921 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653664363433343063663037663338383664346336316531653762 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.656000 audit: BPF prog-id=102 op=LOAD Jul 2 07:58:46.656000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028b5a8 items=0 ppid=2921 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653664363433343063663037663338383664346336316531653762 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit: BPF prog-id=103 op=LOAD Jul 2 07:58:46.657000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028b5f8 items=0 ppid=2921 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653664363433343063663037663338383664346336316531653762 Jul 2 07:58:46.657000 audit: BPF prog-id=103 op=UNLOAD Jul 2 07:58:46.657000 audit: BPF prog-id=102 op=UNLOAD Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:46.657000 audit: BPF prog-id=104 op=LOAD Jul 2 07:58:46.657000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028b688 items=0 ppid=2921 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653664363433343063663037663338383664346336316531653762 Jul 2 07:58:46.681617 env[1654]: time="2024-07-02T07:58:46.681536151Z" level=info msg="StartContainer for \"f8e6d64340cf07f3886d4c61e1e7bd9019901bed13f9f527ef8fd215fac17b1b\" returns successfully" Jul 2 07:58:46.888701 kubelet[2031]: E0702 07:58:46.888558 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:47.010834 kubelet[2031]: I0702 07:58:47.010803 2031 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:58:47.010834 kubelet[2031]: I0702 07:58:47.010835 2031 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:58:47.364320 kubelet[2031]: I0702 07:58:47.364289 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-kvxbz" podStartSLOduration=27.768721273 podCreationTimestamp="2024-07-02 07:58:16 +0000 UTC" firstStartedPulling="2024-07-02 07:58:42.950719826 +0000 UTC m=+28.874670931" lastFinishedPulling="2024-07-02 07:58:46.545163708 +0000 UTC m=+32.469114824" observedRunningTime="2024-07-02 07:58:47.362837815 +0000 UTC m=+33.286788929" watchObservedRunningTime="2024-07-02 07:58:47.363165166 +0000 UTC m=+33.287116283" Jul 2 07:58:47.462980 systemd-networkd[1374]: califdaec6b3914: Gained IPv6LL Jul 2 07:58:47.889178 kubelet[2031]: E0702 07:58:47.888984 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:48.889744 kubelet[2031]: E0702 07:58:48.889666 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:49.356147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount216187829.mount: Deactivated successfully. Jul 2 07:58:49.890241 kubelet[2031]: E0702 07:58:49.890169 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:50.890534 kubelet[2031]: E0702 07:58:50.890495 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:51.493472 env[1654]: time="2024-07-02T07:58:51.493417507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:51.497118 env[1654]: time="2024-07-02T07:58:51.497071243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:51.500274 env[1654]: time="2024-07-02T07:58:51.500227119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:51.505744 env[1654]: time="2024-07-02T07:58:51.505535901Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:51.510979 env[1654]: time="2024-07-02T07:58:51.510863150Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:58:51.514746 env[1654]: time="2024-07-02T07:58:51.514702264Z" level=info msg="CreateContainer within sandbox \"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 07:58:51.550530 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1188432052.mount: Deactivated successfully. Jul 2 07:58:51.575045 env[1654]: time="2024-07-02T07:58:51.574975439Z" level=info msg="CreateContainer within sandbox \"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"773d0af81917f099d84a007b0ff086810adcb4af4a8772eb6017b3e739da2f11\"" Jul 2 07:58:51.577208 env[1654]: time="2024-07-02T07:58:51.577156673Z" level=info msg="StartContainer for \"773d0af81917f099d84a007b0ff086810adcb4af4a8772eb6017b3e739da2f11\"" Jul 2 07:58:51.614286 systemd[1]: Started cri-containerd-773d0af81917f099d84a007b0ff086810adcb4af4a8772eb6017b3e739da2f11.scope. Jul 2 07:58:51.640682 kernel: kauditd_printk_skb: 196 callbacks suppressed Jul 2 07:58:51.640847 kernel: audit: type=1400 audit(1719907131.637:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.649587 kernel: audit: type=1400 audit(1719907131.637:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.660323 kernel: audit: type=1400 audit(1719907131.637:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.664970 kernel: audit: type=1400 audit(1719907131.637:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.665114 kernel: audit: type=1400 audit(1719907131.637:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.671941 kernel: audit: type=1400 audit(1719907131.637:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.674761 kernel: audit: type=1400 audit(1719907131.637:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.688708 kernel: audit: type=1400 audit(1719907131.637:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.696741 kernel: audit: type=1400 audit(1719907131.637:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.697091 env[1654]: time="2024-07-02T07:58:51.697042311Z" level=info msg="StartContainer for \"773d0af81917f099d84a007b0ff086810adcb4af4a8772eb6017b3e739da2f11\" returns successfully" Jul 2 07:58:51.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.638000 audit: BPF prog-id=105 op=LOAD Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3067 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.703784 kernel: audit: type=1400 audit(1719907131.638:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737336430616638313931376630393964383461303037623066663038 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3067 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737336430616638313931376630393964383461303037623066663038 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.641000 audit: BPF prog-id=106 op=LOAD Jul 2 07:58:51.641000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000340290 items=0 ppid=3067 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737336430616638313931376630393964383461303037623066663038 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.644000 audit: BPF prog-id=107 op=LOAD Jul 2 07:58:51.644000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003402d8 items=0 ppid=3067 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737336430616638313931376630393964383461303037623066663038 Jul 2 07:58:51.648000 audit: BPF prog-id=107 op=UNLOAD Jul 2 07:58:51.648000 audit: BPF prog-id=106 op=UNLOAD Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.648000 audit: BPF prog-id=108 op=LOAD Jul 2 07:58:51.648000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003406e8 items=0 ppid=3067 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737336430616638313931376630393964383461303037623066663038 Jul 2 07:58:51.890859 kubelet[2031]: E0702 07:58:51.890724 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:52.370281 kubelet[2031]: I0702 07:58:52.370238 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-lhbhd" podStartSLOduration=18.147189133 podCreationTimestamp="2024-07-02 07:58:29 +0000 UTC" firstStartedPulling="2024-07-02 07:58:46.288223889 +0000 UTC m=+32.212174996" lastFinishedPulling="2024-07-02 07:58:51.511223761 +0000 UTC m=+37.435174863" observedRunningTime="2024-07-02 07:58:52.370004064 +0000 UTC m=+38.293955178" watchObservedRunningTime="2024-07-02 07:58:52.370189 +0000 UTC m=+38.294140117" Jul 2 07:58:52.890971 kubelet[2031]: E0702 07:58:52.890916 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:53.891603 kubelet[2031]: E0702 07:58:53.891549 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:54.861508 kubelet[2031]: E0702 07:58:54.861455 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:54.891959 kubelet[2031]: E0702 07:58:54.891906 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:55.892494 kubelet[2031]: E0702 07:58:55.892445 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:56.892940 kubelet[2031]: E0702 07:58:56.892885 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:57.893474 kubelet[2031]: E0702 07:58:57.893434 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:58.893652 kubelet[2031]: E0702 07:58:58.893565 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:59.894242 kubelet[2031]: E0702 07:58:59.894178 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:00.399665 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:59:00.399860 kernel: audit: type=1325 audit(1719907140.394:659): table=filter:71 family=2 entries=20 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.394000 audit[3320]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.394000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6b25fae0 a2=0 a3=7fff6b25facc items=0 ppid=2247 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.418100 kernel: audit: type=1300 audit(1719907140.394:659): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6b25fae0 a2=0 a3=7fff6b25facc items=0 ppid=2247 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.418285 kernel: audit: type=1327 audit(1719907140.394:659): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.427000 audit[3320]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.427000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff6b25fae0 a2=0 a3=0 items=0 ppid=2247 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.434653 kernel: audit: type=1325 audit(1719907140.427:660): table=nat:72 family=2 entries=20 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.434738 kernel: audit: type=1300 audit(1719907140.427:660): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff6b25fae0 a2=0 a3=0 items=0 ppid=2247 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.456745 kernel: audit: type=1327 audit(1719907140.427:660): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.479171 kubelet[2031]: I0702 07:59:00.479105 2031 topology_manager.go:215] "Topology Admit Handler" podUID="2b753968-9a3b-4887-b444-59095ce0270e" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 07:59:00.482000 audit[3324]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.482000 audit[3324]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcaa00bb20 a2=0 a3=7ffcaa00bb0c items=0 ppid=2247 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.488920 systemd[1]: Created slice kubepods-besteffort-pod2b753968_9a3b_4887_b444_59095ce0270e.slice. Jul 2 07:59:00.496586 kernel: audit: type=1325 audit(1719907140.482:661): table=filter:73 family=2 entries=32 op=nft_register_rule pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.496731 kernel: audit: type=1300 audit(1719907140.482:661): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcaa00bb20 a2=0 a3=7ffcaa00bb0c items=0 ppid=2247 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.506674 kernel: audit: type=1327 audit(1719907140.482:661): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.506845 kernel: audit: type=1325 audit(1719907140.497:662): table=nat:74 family=2 entries=20 op=nft_register_rule pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.497000 audit[3324]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:00.497000 audit[3324]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcaa00bb20 a2=0 a3=0 items=0 ppid=2247 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:00.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:00.605458 kubelet[2031]: I0702 07:59:00.605418 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kfg7w\" (UniqueName: \"kubernetes.io/projected/2b753968-9a3b-4887-b444-59095ce0270e-kube-api-access-kfg7w\") pod \"nfs-server-provisioner-0\" (UID: \"2b753968-9a3b-4887-b444-59095ce0270e\") " pod="default/nfs-server-provisioner-0" Jul 2 07:59:00.605851 kubelet[2031]: I0702 07:59:00.605563 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/2b753968-9a3b-4887-b444-59095ce0270e-data\") pod \"nfs-server-provisioner-0\" (UID: \"2b753968-9a3b-4887-b444-59095ce0270e\") " pod="default/nfs-server-provisioner-0" Jul 2 07:59:00.797020 env[1654]: time="2024-07-02T07:59:00.796963481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2b753968-9a3b-4887-b444-59095ce0270e,Namespace:default,Attempt:0,}" Jul 2 07:59:00.894794 kubelet[2031]: E0702 07:59:00.894754 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:01.075585 (udev-worker)[3322]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:59:01.077444 systemd-networkd[1374]: cali60e51b789ff: Link UP Jul 2 07:59:01.083068 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:59:01.083192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 07:59:01.083525 systemd-networkd[1374]: cali60e51b789ff: Gained carrier Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:00.940 [INFO][3326] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.164-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 2b753968-9a3b-4887-b444-59095ce0270e 1025 0 2024-07-02 07:59:00 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.22.164 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:00.940 [INFO][3326] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:00.998 [INFO][3338] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" HandleID="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Workload="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.014 [INFO][3338] ipam_plugin.go 264: Auto assigning IP ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" HandleID="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Workload="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a3f0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.164", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 07:59:00.998274879 +0000 UTC"}, Hostname:"172.31.22.164", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.015 [INFO][3338] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.015 [INFO][3338] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.015 [INFO][3338] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.164' Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.018 [INFO][3338] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.027 [INFO][3338] ipam.go 372: Looking up existing affinities for host host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.043 [INFO][3338] ipam.go 489: Trying affinity for 192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.047 [INFO][3338] ipam.go 155: Attempting to load block cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.050 [INFO][3338] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.051 [INFO][3338] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.50.128/26 handle="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.054 [INFO][3338] ipam.go 1685: Creating new handle: k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5 Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.061 [INFO][3338] ipam.go 1203: Writing block in order to claim IPs block=192.168.50.128/26 handle="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.069 [INFO][3338] ipam.go 1216: Successfully claimed IPs: [192.168.50.131/26] block=192.168.50.128/26 handle="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.070 [INFO][3338] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.50.131/26] handle="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" host="172.31.22.164" Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.070 [INFO][3338] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:01.105503 env[1654]: 2024-07-02 07:59:01.070 [INFO][3338] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.50.131/26] IPv6=[] ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" HandleID="k8s-pod-network.fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Workload="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.106655 env[1654]: 2024-07-02 07:59:01.072 [INFO][3326] k8s.go 386: Populated endpoint ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2b753968-9a3b-4887-b444-59095ce0270e", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.50.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:01.106655 env[1654]: 2024-07-02 07:59:01.072 [INFO][3326] k8s.go 387: Calico CNI using IPs: [192.168.50.131/32] ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.106655 env[1654]: 2024-07-02 07:59:01.072 [INFO][3326] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.106655 env[1654]: 2024-07-02 07:59:01.084 [INFO][3326] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.106995 env[1654]: 2024-07-02 07:59:01.085 [INFO][3326] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2b753968-9a3b-4887-b444-59095ce0270e", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.50.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:6f:46:fc:5a:14", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:01.106995 env[1654]: 2024-07-02 07:59:01.103 [INFO][3326] k8s.go 500: Wrote updated endpoint to datastore ContainerID="fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.164-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:59:01.130465 env[1654]: time="2024-07-02T07:59:01.130214560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:59:01.130465 env[1654]: time="2024-07-02T07:59:01.130269365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:59:01.130465 env[1654]: time="2024-07-02T07:59:01.130286446Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:59:01.130775 env[1654]: time="2024-07-02T07:59:01.130506974Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5 pid=3362 runtime=io.containerd.runc.v2 Jul 2 07:59:01.141000 audit[3370]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:59:01.141000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffed351aad0 a2=0 a3=7ffed351aabc items=0 ppid=2695 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:59:01.165895 systemd[1]: Started cri-containerd-fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5.scope. Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.204000 audit: BPF prog-id=109 op=LOAD Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3362 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653235336339643265333939306434303735393966326136646235 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3362 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653235336339643265333939306434303735393966326136646235 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.205000 audit: BPF prog-id=110 op=LOAD Jul 2 07:59:01.205000 audit[3372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024690 items=0 ppid=3362 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653235336339643265333939306434303735393966326136646235 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit: BPF prog-id=111 op=LOAD Jul 2 07:59:01.206000 audit[3372]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000246d8 items=0 ppid=3362 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653235336339643265333939306434303735393966326136646235 Jul 2 07:59:01.206000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:59:01.206000 audit: BPF prog-id=110 op=UNLOAD Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { perfmon } for pid=3372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit[3372]: AVC avc: denied { bpf } for pid=3372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:01.206000 audit: BPF prog-id=112 op=LOAD Jul 2 07:59:01.206000 audit[3372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ae8 items=0 ppid=3362 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664653235336339643265333939306434303735393966326136646235 Jul 2 07:59:01.250768 env[1654]: time="2024-07-02T07:59:01.250101090Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2b753968-9a3b-4887-b444-59095ce0270e,Namespace:default,Attempt:0,} returns sandbox id \"fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5\"" Jul 2 07:59:01.252336 env[1654]: time="2024-07-02T07:59:01.252298344Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 07:59:01.747157 systemd[1]: run-containerd-runc-k8s.io-fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5-runc.YvfOmL.mount: Deactivated successfully. Jul 2 07:59:01.895796 kubelet[2031]: E0702 07:59:01.895721 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:02.898063 kubelet[2031]: E0702 07:59:02.897985 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:03.014995 systemd-networkd[1374]: cali60e51b789ff: Gained IPv6LL Jul 2 07:59:03.286813 systemd[1]: run-containerd-runc-k8s.io-777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab-runc.C5WsCI.mount: Deactivated successfully. Jul 2 07:59:03.900257 kubelet[2031]: E0702 07:59:03.900220 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:04.582243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3052167313.mount: Deactivated successfully. Jul 2 07:59:04.905213 kubelet[2031]: E0702 07:59:04.904786 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:05.905150 kubelet[2031]: E0702 07:59:05.905111 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:06.906116 kubelet[2031]: E0702 07:59:06.906040 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:07.888051 env[1654]: time="2024-07-02T07:59:07.887838350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:07.897510 env[1654]: time="2024-07-02T07:59:07.897459859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:07.907470 kubelet[2031]: E0702 07:59:07.907133 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:07.914490 env[1654]: time="2024-07-02T07:59:07.914444206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:07.928769 env[1654]: time="2024-07-02T07:59:07.928716327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:07.931674 env[1654]: time="2024-07-02T07:59:07.931543582Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 07:59:07.947727 env[1654]: time="2024-07-02T07:59:07.945166557Z" level=info msg="CreateContainer within sandbox \"fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 07:59:07.983368 env[1654]: time="2024-07-02T07:59:07.983317333Z" level=info msg="CreateContainer within sandbox \"fde253c9d2e3990d407599f2a6db51f390c3e256f067b815486689d95ba118b5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"59bbb51e2e0d7cf05eb7c8c1a7d1985010015fa47c0054d59ab53c543b2e3e0a\"" Jul 2 07:59:07.984742 env[1654]: time="2024-07-02T07:59:07.984679240Z" level=info msg="StartContainer for \"59bbb51e2e0d7cf05eb7c8c1a7d1985010015fa47c0054d59ab53c543b2e3e0a\"" Jul 2 07:59:08.042562 systemd[1]: Started cri-containerd-59bbb51e2e0d7cf05eb7c8c1a7d1985010015fa47c0054d59ab53c543b2e3e0a.scope. Jul 2 07:59:08.063844 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 07:59:08.064136 kernel: audit: type=1400 audit(1719907148.059:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.075890 kernel: audit: type=1400 audit(1719907148.059:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.081869 kernel: audit: type=1400 audit(1719907148.059:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.092561 kernel: audit: type=1400 audit(1719907148.059:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.092948 kernel: audit: type=1400 audit(1719907148.059:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.101000 kernel: audit: type=1400 audit(1719907148.059:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.101237 kernel: audit: type=1400 audit(1719907148.059:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.113348 kernel: audit: type=1400 audit(1719907148.059:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.121113 kernel: audit: type=1400 audit(1719907148.059:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.128682 kernel: audit: type=1400 audit(1719907148.060:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.060000 audit: BPF prog-id=113 op=LOAD Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3362 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.129536 env[1654]: time="2024-07-02T07:59:08.129120522Z" level=info msg="StartContainer for \"59bbb51e2e0d7cf05eb7c8c1a7d1985010015fa47c0054d59ab53c543b2e3e0a\" returns successfully" Jul 2 07:59:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626262353165326530643763663035656237633863316137643139 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3362 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626262353165326530643763663035656237633863316137643139 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit: BPF prog-id=114 op=LOAD Jul 2 07:59:08.068000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000243a0 items=0 ppid=3362 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626262353165326530643763663035656237633863316137643139 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit: BPF prog-id=115 op=LOAD Jul 2 07:59:08.068000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000243e8 items=0 ppid=3362 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626262353165326530643763663035656237633863316137643139 Jul 2 07:59:08.068000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:59:08.068000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:08.068000 audit: BPF prog-id=116 op=LOAD Jul 2 07:59:08.068000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000247f8 items=0 ppid=3362 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626262353165326530643763663035656237633863316137643139 Jul 2 07:59:08.189000 audit[3461]: AVC avc: denied { search } for pid=3461 comm="rpcbind" name="crypto" dev="proc" ino=23744 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:59:08.189000 audit[3461]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f47d4c900c0 a2=0 a3=0 items=0 ppid=3445 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 key=(null) Jul 2 07:59:08.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 07:59:08.250000 audit[3467]: NETFILTER_CFG table=filter:76 family=2 entries=33 op=nft_register_rule pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:08.250000 audit[3467]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe12d6daf0 a2=0 a3=7ffe12d6dadc items=0 ppid=2247 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:08.252000 audit[3467]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:08.252000 audit[3467]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe12d6daf0 a2=0 a3=0 items=0 ppid=2247 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:08.267000 audit[3469]: AVC avc: denied { search } for pid=3469 comm="dbus-daemon" name="crypto" dev="proc" ino=23744 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:59:08.267000 audit[3469]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2e8b91c0c0 a2=0 a3=0 items=0 ppid=3445 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 key=(null) Jul 2 07:59:08.267000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:59:08.269000 audit[3471]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_rule pid=3471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:08.269000 audit[3471]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc0a9279b0 a2=0 a3=7ffc0a92799c items=0 ppid=2247 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:08.274000 audit[3472]: AVC avc: denied { watch } for pid=3472 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536158 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c704 tclass=dir permissive=0 Jul 2 07:59:08.274000 audit[3472]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56057da02590 a2=2c8 a3=7fff9fd6099c items=0 ppid=3445 pid=3472 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 key=(null) Jul 2 07:59:08.274000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:59:08.272000 audit[3471]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=3471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:08.272000 audit[3471]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc0a9279b0 a2=0 a3=0 items=0 ppid=2247 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:08.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:08.281000 audit[3473]: AVC avc: denied { read } for pid=3473 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 07:59:08.281000 audit[3473]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fc91c7eb320 a1=80000 a2=d a3=7fff80ba9780 items=0 ppid=3445 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 key=(null) Jul 2 07:59:08.281000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:59:08.282000 audit[3473]: AVC avc: denied { search } for pid=3473 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23744 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:59:08.282000 audit[3473]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc91bd3f0c0 a2=0 a3=0 items=0 ppid=3445 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c704 key=(null) Jul 2 07:59:08.282000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:59:08.294187 kubelet[2031]: I0702 07:59:08.293772 2031 topology_manager.go:215] "Topology Admit Handler" podUID="98e017c5-7377-4023-9442-edd2fda722d4" podNamespace="calico-apiserver" podName="calico-apiserver-5f595bb764-5m2gh" Jul 2 07:59:08.309023 systemd[1]: Created slice kubepods-besteffort-pod98e017c5_7377_4023_9442_edd2fda722d4.slice. Jul 2 07:59:08.401340 kubelet[2031]: I0702 07:59:08.399236 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gzw6k\" (UniqueName: \"kubernetes.io/projected/98e017c5-7377-4023-9442-edd2fda722d4-kube-api-access-gzw6k\") pod \"calico-apiserver-5f595bb764-5m2gh\" (UID: \"98e017c5-7377-4023-9442-edd2fda722d4\") " pod="calico-apiserver/calico-apiserver-5f595bb764-5m2gh" Jul 2 07:59:08.401340 kubelet[2031]: I0702 07:59:08.399661 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/98e017c5-7377-4023-9442-edd2fda722d4-calico-apiserver-certs\") pod \"calico-apiserver-5f595bb764-5m2gh\" (UID: \"98e017c5-7377-4023-9442-edd2fda722d4\") " pod="calico-apiserver/calico-apiserver-5f595bb764-5m2gh" Jul 2 07:59:08.503545 kubelet[2031]: E0702 07:59:08.503499 2031 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 07:59:08.505934 kubelet[2031]: E0702 07:59:08.505894 2031 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/98e017c5-7377-4023-9442-edd2fda722d4-calico-apiserver-certs podName:98e017c5-7377-4023-9442-edd2fda722d4 nodeName:}" failed. No retries permitted until 2024-07-02 07:59:09.003660479 +0000 UTC m=+54.927611588 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/98e017c5-7377-4023-9442-edd2fda722d4-calico-apiserver-certs") pod "calico-apiserver-5f595bb764-5m2gh" (UID: "98e017c5-7377-4023-9442-edd2fda722d4") : secret "calico-apiserver-certs" not found Jul 2 07:59:08.907866 kubelet[2031]: E0702 07:59:08.907676 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:09.214836 env[1654]: time="2024-07-02T07:59:09.214783326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f595bb764-5m2gh,Uid:98e017c5-7377-4023-9442-edd2fda722d4,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:59:09.293000 audit[3491]: NETFILTER_CFG table=filter:80 family=2 entries=22 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:09.293000 audit[3491]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe542ed390 a2=0 a3=7ffe542ed37c items=0 ppid=2247 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:09.297000 audit[3491]: NETFILTER_CFG table=nat:81 family=2 entries=104 op=nft_register_chain pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:09.297000 audit[3491]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffe542ed390 a2=0 a3=7ffe542ed37c items=0 ppid=2247 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:09.541842 systemd-networkd[1374]: calib0154dc8674: Link UP Jul 2 07:59:09.549612 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:59:09.549777 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0154dc8674: link becomes ready Jul 2 07:59:09.550702 systemd-networkd[1374]: calib0154dc8674: Gained carrier Jul 2 07:59:09.552860 (udev-worker)[3508]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:59:09.571173 kubelet[2031]: I0702 07:59:09.569186 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.888255109 podCreationTimestamp="2024-07-02 07:59:00 +0000 UTC" firstStartedPulling="2024-07-02 07:59:01.2517477 +0000 UTC m=+47.175698794" lastFinishedPulling="2024-07-02 07:59:07.932496359 +0000 UTC m=+53.856447454" observedRunningTime="2024-07-02 07:59:08.428770152 +0000 UTC m=+54.352721267" watchObservedRunningTime="2024-07-02 07:59:09.569003769 +0000 UTC m=+55.492954884" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.345 [INFO][3480] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0 calico-apiserver-5f595bb764- calico-apiserver 98e017c5-7377-4023-9442-edd2fda722d4 1102 0 2024-07-02 07:59:08 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f595bb764 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.22.164 calico-apiserver-5f595bb764-5m2gh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib0154dc8674 [] []}} ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.346 [INFO][3480] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.409 [INFO][3494] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" HandleID="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Workload="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.434 [INFO][3494] ipam_plugin.go 264: Auto assigning IP ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" HandleID="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Workload="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efd20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.22.164", "pod":"calico-apiserver-5f595bb764-5m2gh", "timestamp":"2024-07-02 07:59:09.409128246 +0000 UTC"}, Hostname:"172.31.22.164", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.434 [INFO][3494] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.434 [INFO][3494] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.435 [INFO][3494] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.164' Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.440 [INFO][3494] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.454 [INFO][3494] ipam.go 372: Looking up existing affinities for host host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.476 [INFO][3494] ipam.go 489: Trying affinity for 192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.482 [INFO][3494] ipam.go 155: Attempting to load block cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.488 [INFO][3494] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.489 [INFO][3494] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.50.128/26 handle="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.493 [INFO][3494] ipam.go 1685: Creating new handle: k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1 Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.507 [INFO][3494] ipam.go 1203: Writing block in order to claim IPs block=192.168.50.128/26 handle="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.532 [INFO][3494] ipam.go 1216: Successfully claimed IPs: [192.168.50.132/26] block=192.168.50.128/26 handle="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.532 [INFO][3494] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.50.132/26] handle="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" host="172.31.22.164" Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.532 [INFO][3494] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:09.580404 env[1654]: 2024-07-02 07:59:09.532 [INFO][3494] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.50.132/26] IPv6=[] ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" HandleID="k8s-pod-network.550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Workload="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.535 [INFO][3480] k8s.go 386: Populated endpoint ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0", GenerateName:"calico-apiserver-5f595bb764-", Namespace:"calico-apiserver", SelfLink:"", UID:"98e017c5-7377-4023-9442-edd2fda722d4", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f595bb764", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"", Pod:"calico-apiserver-5f595bb764-5m2gh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.50.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib0154dc8674", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.536 [INFO][3480] k8s.go 387: Calico CNI using IPs: [192.168.50.132/32] ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.536 [INFO][3480] dataplane_linux.go 68: Setting the host side veth name to calib0154dc8674 ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.550 [INFO][3480] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.551 [INFO][3480] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0", GenerateName:"calico-apiserver-5f595bb764-", Namespace:"calico-apiserver", SelfLink:"", UID:"98e017c5-7377-4023-9442-edd2fda722d4", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f595bb764", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1", Pod:"calico-apiserver-5f595bb764-5m2gh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.50.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib0154dc8674", MAC:"de:ec:28:9e:93:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:09.581704 env[1654]: 2024-07-02 07:59:09.567 [INFO][3480] k8s.go 500: Wrote updated endpoint to datastore ContainerID="550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1" Namespace="calico-apiserver" Pod="calico-apiserver-5f595bb764-5m2gh" WorkloadEndpoint="172.31.22.164-k8s-calico--apiserver--5f595bb764--5m2gh-eth0" Jul 2 07:59:09.621552 env[1654]: time="2024-07-02T07:59:09.621373999Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:59:09.621832 env[1654]: time="2024-07-02T07:59:09.621639050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:59:09.621832 env[1654]: time="2024-07-02T07:59:09.621682107Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:59:09.622001 env[1654]: time="2024-07-02T07:59:09.621949609Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1 pid=3528 runtime=io.containerd.runc.v2 Jul 2 07:59:09.665000 audit[3537]: NETFILTER_CFG table=filter:82 family=2 entries=51 op=nft_register_chain pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:59:09.665000 audit[3537]: SYSCALL arch=c000003e syscall=46 success=yes exit=26276 a0=3 a1=7ffd86d70200 a2=0 a3=7ffd86d701ec items=0 ppid=2695 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:59:09.669307 systemd[1]: Started cri-containerd-550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1.scope. Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.706000 audit: BPF prog-id=117 op=LOAD Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306336653962623933356136303062383631323762633230633536 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306336653962623933356136303062383631323762633230633536 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit: BPF prog-id=118 op=LOAD Jul 2 07:59:09.708000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cc750 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306336653962623933356136303062383631323762633230633536 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit: BPF prog-id=119 op=LOAD Jul 2 07:59:09.708000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cc798 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306336653962623933356136303062383631323762633230633536 Jul 2 07:59:09.708000 audit: BPF prog-id=119 op=UNLOAD Jul 2 07:59:09.708000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:09.708000 audit: BPF prog-id=120 op=LOAD Jul 2 07:59:09.708000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ccba8 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306336653962623933356136303062383631323762633230633536 Jul 2 07:59:09.762716 env[1654]: time="2024-07-02T07:59:09.761929751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f595bb764-5m2gh,Uid:98e017c5-7377-4023-9442-edd2fda722d4,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1\"" Jul 2 07:59:09.764057 env[1654]: time="2024-07-02T07:59:09.763864267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:59:09.908901 kubelet[2031]: E0702 07:59:09.908742 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:10.910163 kubelet[2031]: E0702 07:59:10.910077 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:11.079007 systemd-networkd[1374]: calib0154dc8674: Gained IPv6LL Jul 2 07:59:11.911047 kubelet[2031]: E0702 07:59:11.910965 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:12.728024 env[1654]: time="2024-07-02T07:59:12.727963873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:12.730719 env[1654]: time="2024-07-02T07:59:12.730674388Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:12.732927 env[1654]: time="2024-07-02T07:59:12.732882029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:12.734826 env[1654]: time="2024-07-02T07:59:12.734782274Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:12.735525 env[1654]: time="2024-07-02T07:59:12.735482252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:59:12.738373 env[1654]: time="2024-07-02T07:59:12.738331442Z" level=info msg="CreateContainer within sandbox \"550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:59:12.757972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2554362861.mount: Deactivated successfully. Jul 2 07:59:12.763349 env[1654]: time="2024-07-02T07:59:12.763299378Z" level=info msg="CreateContainer within sandbox \"550c6e9bb935a600b86127bc20c56ef3490bf3c3e0d4b1a5db93f01719ab62e1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f2084e77eb2522a9ada7ad2972150c97b5209ec007eee0a8160f29af475c432b\"" Jul 2 07:59:12.764232 env[1654]: time="2024-07-02T07:59:12.764174911Z" level=info msg="StartContainer for \"f2084e77eb2522a9ada7ad2972150c97b5209ec007eee0a8160f29af475c432b\"" Jul 2 07:59:12.792839 systemd[1]: Started cri-containerd-f2084e77eb2522a9ada7ad2972150c97b5209ec007eee0a8160f29af475c432b.scope. Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.846000 audit: BPF prog-id=121 op=LOAD Jul 2 07:59:12.853000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.853000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303834653737656232353232613961646137616432393732313530 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303834653737656232353232613961646137616432393732313530 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit: BPF prog-id=122 op=LOAD Jul 2 07:59:12.854000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b290 items=0 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303834653737656232353232613961646137616432393732313530 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit: BPF prog-id=123 op=LOAD Jul 2 07:59:12.854000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b2d8 items=0 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303834653737656232353232613961646137616432393732313530 Jul 2 07:59:12.854000 audit: BPF prog-id=123 op=UNLOAD Jul 2 07:59:12.854000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:12.854000 audit: BPF prog-id=124 op=LOAD Jul 2 07:59:12.854000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b6e8 items=0 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:12.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303834653737656232353232613961646137616432393732313530 Jul 2 07:59:12.911732 kubelet[2031]: E0702 07:59:12.911689 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:12.924877 env[1654]: time="2024-07-02T07:59:12.924818506Z" level=info msg="StartContainer for \"f2084e77eb2522a9ada7ad2972150c97b5209ec007eee0a8160f29af475c432b\" returns successfully" Jul 2 07:59:13.471888 kubelet[2031]: I0702 07:59:13.471844 2031 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f595bb764-5m2gh" podStartSLOduration=2.499365391 podCreationTimestamp="2024-07-02 07:59:08 +0000 UTC" firstStartedPulling="2024-07-02 07:59:09.763416087 +0000 UTC m=+55.687367178" lastFinishedPulling="2024-07-02 07:59:12.735846965 +0000 UTC m=+58.659798078" observedRunningTime="2024-07-02 07:59:13.470276688 +0000 UTC m=+59.394227794" watchObservedRunningTime="2024-07-02 07:59:13.471796291 +0000 UTC m=+59.395747406" Jul 2 07:59:13.547808 kernel: kauditd_printk_skb: 197 callbacks suppressed Jul 2 07:59:13.547979 kernel: audit: type=1400 audit(1719907153.538:748): avc: denied { watch } for pid=3584 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_59_09.237967490/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c356,c609 tclass=file permissive=0 Jul 2 07:59:13.538000 audit[3584]: AVC avc: denied { watch } for pid=3584 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_59_09.237967490/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c356,c609 tclass=file permissive=0 Jul 2 07:59:13.540000 audit[3607]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:13.552072 kernel: audit: type=1325 audit(1719907153.540:749): table=filter:83 family=2 entries=10 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:13.540000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc8e1d4c70 a2=0 a3=7ffc8e1d4c5c items=0 ppid=2247 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:13.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:13.564023 kernel: audit: type=1300 audit(1719907153.540:749): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc8e1d4c70 a2=0 a3=7ffc8e1d4c5c items=0 ppid=2247 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:13.564203 kernel: audit: type=1327 audit(1719907153.540:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:13.564250 kernel: audit: type=1300 audit(1719907153.538:748): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009b52e0 a2=fc6 a3=0 items=0 ppid=3528 pid=3584 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 key=(null) Jul 2 07:59:13.538000 audit[3584]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009b52e0 a2=fc6 a3=0 items=0 ppid=3528 pid=3584 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 key=(null) Jul 2 07:59:13.573657 kernel: audit: type=1327 audit(1719907153.538:748): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:13.538000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:59:13.547000 audit[3607]: NETFILTER_CFG table=nat:84 family=2 entries=44 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:13.582110 kernel: audit: type=1325 audit(1719907153.547:750): table=nat:84 family=2 entries=44 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:13.582258 kernel: audit: type=1300 audit(1719907153.547:750): arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc8e1d4c70 a2=0 a3=7ffc8e1d4c5c items=0 ppid=2247 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:13.547000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc8e1d4c70 a2=0 a3=7ffc8e1d4c5c items=0 ppid=2247 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:13.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:13.592794 kernel: audit: type=1327 audit(1719907153.547:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:13.912022 kubelet[2031]: E0702 07:59:13.911883 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:14.423520 kubelet[2031]: I0702 07:59:14.423412 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:59:14.786000 audit[3611]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:14.786000 audit[3611]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc729d8e80 a2=0 a3=7ffc729d8e6c items=0 ppid=2247 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:14.798922 kernel: audit: type=1325 audit(1719907154.786:751): table=filter:85 family=2 entries=10 op=nft_register_rule pid=3611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:14.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:14.790000 audit[3611]: NETFILTER_CFG table=nat:86 family=2 entries=44 op=nft_register_rule pid=3611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:14.790000 audit[3611]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc729d8e80 a2=0 a3=7ffc729d8e6c items=0 ppid=2247 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:14.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:14.860995 kubelet[2031]: E0702 07:59:14.860940 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:14.879046 env[1654]: time="2024-07-02T07:59:14.878992625Z" level=info msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" Jul 2 07:59:14.921976 kubelet[2031]: E0702 07:59:14.921835 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:14.999 [WARNING][3624] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-csi--node--driver--kvxbz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8bb0cda0-286b-43a6-8c07-91eb35df53bc", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59", Pod:"csi-node-driver-kvxbz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9f0d1f665fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:14.999 [INFO][3624] k8s.go 608: Cleaning up netns ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:14.999 [INFO][3624] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" iface="eth0" netns="" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:14.999 [INFO][3624] k8s.go 615: Releasing IP address(es) ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:14.999 [INFO][3624] utils.go 188: Calico CNI releasing IP address ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.055 [INFO][3630] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.055 [INFO][3630] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.055 [INFO][3630] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.074 [WARNING][3630] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.075 [INFO][3630] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.081 [INFO][3630] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:15.093772 env[1654]: 2024-07-02 07:59:15.087 [INFO][3624] k8s.go 621: Teardown processing complete. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.093772 env[1654]: time="2024-07-02T07:59:15.093228341Z" level=info msg="TearDown network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" successfully" Jul 2 07:59:15.093772 env[1654]: time="2024-07-02T07:59:15.093267307Z" level=info msg="StopPodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" returns successfully" Jul 2 07:59:15.112075 env[1654]: time="2024-07-02T07:59:15.112026403Z" level=info msg="RemovePodSandbox for \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" Jul 2 07:59:15.112259 env[1654]: time="2024-07-02T07:59:15.112076500Z" level=info msg="Forcibly stopping sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\"" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.173 [WARNING][3648] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-csi--node--driver--kvxbz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8bb0cda0-286b-43a6-8c07-91eb35df53bc", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"95f6b2755530d1056b27690e41a631ce03ea2c54fdf7b397a12536c41886ec59", Pod:"csi-node-driver-kvxbz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9f0d1f665fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.174 [INFO][3648] k8s.go 608: Cleaning up netns ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.174 [INFO][3648] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" iface="eth0" netns="" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.174 [INFO][3648] k8s.go 615: Releasing IP address(es) ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.174 [INFO][3648] utils.go 188: Calico CNI releasing IP address ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.323 [INFO][3654] ipam_plugin.go 411: Releasing address using handleID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.323 [INFO][3654] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.323 [INFO][3654] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.337 [WARNING][3654] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.337 [INFO][3654] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" HandleID="k8s-pod-network.b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Workload="172.31.22.164-k8s-csi--node--driver--kvxbz-eth0" Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.340 [INFO][3654] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:15.343589 env[1654]: 2024-07-02 07:59:15.341 [INFO][3648] k8s.go 621: Teardown processing complete. ContainerID="b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693" Jul 2 07:59:15.348257 env[1654]: time="2024-07-02T07:59:15.343723840Z" level=info msg="TearDown network for sandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" successfully" Jul 2 07:59:15.354763 env[1654]: time="2024-07-02T07:59:15.354700187Z" level=info msg="RemovePodSandbox \"b22d0f0be0fc7a234e5a03b826b3b121c2ef587a75eda3d953c4cb4334720693\" returns successfully" Jul 2 07:59:15.355437 env[1654]: time="2024-07-02T07:59:15.355324155Z" level=info msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" Jul 2 07:59:15.412000 audit[3680]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:15.412000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4895f740 a2=0 a3=7ffd4895f72c items=0 ppid=2247 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:15.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:15.419000 audit[3680]: NETFILTER_CFG table=nat:88 family=2 entries=51 op=nft_register_chain pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:15.419000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffd4895f740 a2=0 a3=7ffd4895f72c items=0 ppid=2247 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:15.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.525 [WARNING][3675] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"012517ed-475a-41e4-94e8-bd4f9efe9c72", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227", Pod:"nginx-deployment-6d5f899847-lhbhd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califdaec6b3914", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.525 [INFO][3675] k8s.go 608: Cleaning up netns ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.525 [INFO][3675] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" iface="eth0" netns="" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.525 [INFO][3675] k8s.go 615: Releasing IP address(es) ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.525 [INFO][3675] utils.go 188: Calico CNI releasing IP address ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.595 [INFO][3684] ipam_plugin.go 411: Releasing address using handleID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.595 [INFO][3684] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.595 [INFO][3684] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.602 [WARNING][3684] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.602 [INFO][3684] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.604 [INFO][3684] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:15.609180 env[1654]: 2024-07-02 07:59:15.606 [INFO][3675] k8s.go 621: Teardown processing complete. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.609180 env[1654]: time="2024-07-02T07:59:15.608737908Z" level=info msg="TearDown network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" successfully" Jul 2 07:59:15.609180 env[1654]: time="2024-07-02T07:59:15.608792716Z" level=info msg="StopPodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" returns successfully" Jul 2 07:59:15.610943 env[1654]: time="2024-07-02T07:59:15.610903665Z" level=info msg="RemovePodSandbox for \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" Jul 2 07:59:15.611112 env[1654]: time="2024-07-02T07:59:15.610951810Z" level=info msg="Forcibly stopping sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\"" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.676 [WARNING][3702] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"012517ed-475a-41e4-94e8-bd4f9efe9c72", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"f2635ce665eac7a8cfa67c32097fa05a4c8d1f7f4fcb1d446cee4cd75e427227", Pod:"nginx-deployment-6d5f899847-lhbhd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califdaec6b3914", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.676 [INFO][3702] k8s.go 608: Cleaning up netns ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.676 [INFO][3702] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" iface="eth0" netns="" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.677 [INFO][3702] k8s.go 615: Releasing IP address(es) ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.677 [INFO][3702] utils.go 188: Calico CNI releasing IP address ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.718 [INFO][3708] ipam_plugin.go 411: Releasing address using handleID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.719 [INFO][3708] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.719 [INFO][3708] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.735 [WARNING][3708] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.735 [INFO][3708] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" HandleID="k8s-pod-network.8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Workload="172.31.22.164-k8s-nginx--deployment--6d5f899847--lhbhd-eth0" Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.743 [INFO][3708] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:15.745508 env[1654]: 2024-07-02 07:59:15.744 [INFO][3702] k8s.go 621: Teardown processing complete. ContainerID="8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5" Jul 2 07:59:15.746552 env[1654]: time="2024-07-02T07:59:15.745541347Z" level=info msg="TearDown network for sandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" successfully" Jul 2 07:59:15.760687 env[1654]: time="2024-07-02T07:59:15.760616650Z" level=info msg="RemovePodSandbox \"8369327a39ad42c2d56c2523403e639652a57892be19ad343abd51261cdb8cd5\" returns successfully" Jul 2 07:59:15.923176 kubelet[2031]: E0702 07:59:15.923043 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:16.923864 kubelet[2031]: E0702 07:59:16.923809 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:17.924064 kubelet[2031]: E0702 07:59:17.924003 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:18.925129 kubelet[2031]: E0702 07:59:18.925057 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:19.925782 kubelet[2031]: E0702 07:59:19.925725 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:20.926333 kubelet[2031]: E0702 07:59:20.926278 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:21.926666 kubelet[2031]: E0702 07:59:21.926602 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:22.927401 kubelet[2031]: E0702 07:59:22.927347 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:23.928474 kubelet[2031]: E0702 07:59:23.928425 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:24.929005 kubelet[2031]: E0702 07:59:24.928952 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:25.930103 kubelet[2031]: E0702 07:59:25.930050 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:26.138987 kubelet[2031]: I0702 07:59:26.138635 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:59:26.202000 audit[3745]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:26.204893 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 2 07:59:26.205081 kernel: audit: type=1325 audit(1719907166.202:755): table=filter:89 family=2 entries=8 op=nft_register_rule pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:26.202000 audit[3745]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffb0b3a5d0 a2=0 a3=7fffb0b3a5bc items=0 ppid=2247 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:26.215973 kernel: audit: type=1300 audit(1719907166.202:755): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffb0b3a5d0 a2=0 a3=7fffb0b3a5bc items=0 ppid=2247 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:26.216129 kernel: audit: type=1327 audit(1719907166.202:755): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:26.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:26.206000 audit[3745]: NETFILTER_CFG table=nat:90 family=2 entries=58 op=nft_register_chain pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:26.206000 audit[3745]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffb0b3a5d0 a2=0 a3=7fffb0b3a5bc items=0 ppid=2247 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:26.231124 kernel: audit: type=1325 audit(1719907166.206:756): table=nat:90 family=2 entries=58 op=nft_register_chain pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:26.231267 kernel: audit: type=1300 audit(1719907166.206:756): arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffb0b3a5d0 a2=0 a3=7fffb0b3a5bc items=0 ppid=2247 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:26.231319 kernel: audit: type=1327 audit(1719907166.206:756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:26.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:26.930762 kubelet[2031]: E0702 07:59:26.930711 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:27.930921 kubelet[2031]: E0702 07:59:27.930866 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:28.931901 kubelet[2031]: E0702 07:59:28.931845 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:29.932336 kubelet[2031]: E0702 07:59:29.932189 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:30.932731 kubelet[2031]: E0702 07:59:30.932678 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:31.933457 kubelet[2031]: E0702 07:59:31.933405 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:32.837891 kubelet[2031]: I0702 07:59:32.837849 2031 topology_manager.go:215] "Topology Admit Handler" podUID="c8ba52e0-2767-4afb-9318-043de9d9560a" podNamespace="default" podName="test-pod-1" Jul 2 07:59:32.844889 systemd[1]: Created slice kubepods-besteffort-podc8ba52e0_2767_4afb_9318_043de9d9560a.slice. Jul 2 07:59:32.933752 kubelet[2031]: E0702 07:59:32.933694 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:32.977025 kubelet[2031]: I0702 07:59:32.976971 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-46d199bd-6898-423f-938a-141d55ce6ed5\" (UniqueName: \"kubernetes.io/nfs/c8ba52e0-2767-4afb-9318-043de9d9560a-pvc-46d199bd-6898-423f-938a-141d55ce6ed5\") pod \"test-pod-1\" (UID: \"c8ba52e0-2767-4afb-9318-043de9d9560a\") " pod="default/test-pod-1" Jul 2 07:59:32.977261 kubelet[2031]: I0702 07:59:32.977245 2031 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-779bf\" (UniqueName: \"kubernetes.io/projected/c8ba52e0-2767-4afb-9318-043de9d9560a-kube-api-access-779bf\") pod \"test-pod-1\" (UID: \"c8ba52e0-2767-4afb-9318-043de9d9560a\") " pod="default/test-pod-1" Jul 2 07:59:33.129419 kernel: Failed to create system directory netfs Jul 2 07:59:33.129651 kernel: audit: type=1400 audit(1719907173.112:757): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.129701 kernel: Failed to create system directory netfs Jul 2 07:59:33.129743 kernel: audit: type=1400 audit(1719907173.112:757): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.129774 kernel: Failed to create system directory netfs Jul 2 07:59:33.112000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.139259 kernel: Failed to create system directory netfs Jul 2 07:59:33.139362 kernel: audit: type=1400 audit(1719907173.112:757): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.112000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.112000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.148608 kernel: audit: type=1400 audit(1719907173.112:757): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.112000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.112000 audit[3756]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d42fcfd5e0 a1=153bc a2=55d42e3d42b0 a3=5 items=0 ppid=9 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.112000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:33.160614 kernel: audit: type=1300 audit(1719907173.112:757): arch=c000003e syscall=175 success=yes exit=0 a0=55d42fcfd5e0 a1=153bc a2=55d42e3d42b0 a3=5 items=0 ppid=9 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.160737 kernel: audit: type=1327 audit(1719907173.112:757): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:33.177675 kernel: Failed to create system directory fscache Jul 2 07:59:33.177851 kernel: audit: type=1400 audit(1719907173.162:758): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.177894 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.187757 kernel: Failed to create system directory fscache Jul 2 07:59:33.187934 kernel: audit: type=1400 audit(1719907173.162:758): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.187975 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.195342 kernel: audit: type=1400 audit(1719907173.162:758): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.195491 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.202543 kernel: audit: type=1400 audit(1719907173.162:758): avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.202700 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.206064 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.207484 kernel: Failed to create system directory fscache Jul 2 07:59:33.207541 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.210246 kernel: Failed to create system directory fscache Jul 2 07:59:33.210295 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.212835 kernel: Failed to create system directory fscache Jul 2 07:59:33.212878 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.162000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.215450 kernel: Failed to create system directory fscache Jul 2 07:59:33.162000 audit[3756]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d42ff129c0 a1=4c0fc a2=55d42e3d42b0 a3=5 items=0 ppid=9 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.217753 kernel: FS-Cache: Loaded Jul 2 07:59:33.162000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.285406 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.285631 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.287752 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.291091 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.291280 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.292779 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.297073 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.298652 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.300235 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.301838 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.303481 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.305150 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.306638 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.308010 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.311270 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.312720 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.314579 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.319568 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.319661 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.319697 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.322448 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.323773 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.325762 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.327304 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.328639 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.329968 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.331259 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.333032 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.334641 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.336341 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.338158 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.339712 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.340953 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.342324 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.342403 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.344953 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.345044 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.349494 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.349556 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.349600 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.352181 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.353563 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.356106 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.356161 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.357552 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.360337 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.360403 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.360433 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.363245 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.364651 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.365961 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.366047 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.368655 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.369926 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.371163 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.372455 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.373676 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.375374 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.375453 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.378462 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.379943 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.381200 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.388738 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.388872 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.388914 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.390832 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.390903 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.393066 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.393158 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.396090 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.396203 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.398354 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.398467 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.400567 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.400694 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.402781 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.402872 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.404860 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.404987 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.406178 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.408315 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.408382 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.410736 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.410831 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.413357 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.413495 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.415807 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.415888 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.417837 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.417904 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.419860 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.419936 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.421903 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.421987 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.424076 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.424154 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.426235 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.426325 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.429188 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.429301 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.431336 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.431417 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.432646 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.434843 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.434988 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.436962 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.437071 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.439711 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.439810 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.441994 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.442076 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.444289 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.444365 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.446490 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.446584 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.448786 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.448854 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.450700 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.450757 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.452696 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.452761 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.453709 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.456095 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.456167 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.458093 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.458170 kernel: Failed to create system directory sunrpc Jul 2 07:59:33.251000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.469915 kernel: RPC: Registered named UNIX socket transport module. Jul 2 07:59:33.470071 kernel: RPC: Registered udp transport module. Jul 2 07:59:33.470107 kernel: RPC: Registered tcp transport module. Jul 2 07:59:33.471026 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 07:59:33.251000 audit[3756]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d42ff5ead0 a1=1a7f5c a2=55d42e3d42b0 a3=5 items=6 ppid=9 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.251000 audit: CWD cwd="/" Jul 2 07:59:33.251000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PATH item=1 name=(null) inode=23497 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PATH item=2 name=(null) inode=23497 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PATH item=3 name=(null) inode=23498 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PATH item=4 name=(null) inode=23497 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PATH item=5 name=(null) inode=23499 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:33.251000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.537309 kernel: Failed to create system directory nfs Jul 2 07:59:33.537436 kernel: Failed to create system directory nfs Jul 2 07:59:33.537474 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.539494 kernel: Failed to create system directory nfs Jul 2 07:59:33.539555 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.541672 kernel: Failed to create system directory nfs Jul 2 07:59:33.541781 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.543704 kernel: Failed to create system directory nfs Jul 2 07:59:33.543782 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.546686 kernel: Failed to create system directory nfs Jul 2 07:59:33.546782 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.548790 kernel: Failed to create system directory nfs Jul 2 07:59:33.548939 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.550869 kernel: Failed to create system directory nfs Jul 2 07:59:33.550949 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.553159 kernel: Failed to create system directory nfs Jul 2 07:59:33.553232 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.556047 kernel: Failed to create system directory nfs Jul 2 07:59:33.556136 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.558779 kernel: Failed to create system directory nfs Jul 2 07:59:33.558895 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.561314 kernel: Failed to create system directory nfs Jul 2 07:59:33.561396 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.564171 kernel: Failed to create system directory nfs Jul 2 07:59:33.564351 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.566639 kernel: Failed to create system directory nfs Jul 2 07:59:33.566701 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.569264 kernel: Failed to create system directory nfs Jul 2 07:59:33.569349 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.571637 kernel: Failed to create system directory nfs Jul 2 07:59:33.571697 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.574154 kernel: Failed to create system directory nfs Jul 2 07:59:33.574216 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.576714 kernel: Failed to create system directory nfs Jul 2 07:59:33.576843 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.579300 kernel: Failed to create system directory nfs Jul 2 07:59:33.579361 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.581704 kernel: Failed to create system directory nfs Jul 2 07:59:33.581901 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.584352 kernel: Failed to create system directory nfs Jul 2 07:59:33.584464 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.586677 kernel: Failed to create system directory nfs Jul 2 07:59:33.586754 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.589391 kernel: Failed to create system directory nfs Jul 2 07:59:33.589486 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.591588 kernel: Failed to create system directory nfs Jul 2 07:59:33.591675 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.594107 kernel: Failed to create system directory nfs Jul 2 07:59:33.594193 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.596714 kernel: Failed to create system directory nfs Jul 2 07:59:33.596890 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.603565 kernel: Failed to create system directory nfs Jul 2 07:59:33.603719 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.606784 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.613088 kernel: Failed to create system directory nfs Jul 2 07:59:33.613680 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.617084 kernel: Failed to create system directory nfs Jul 2 07:59:33.618373 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.517000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.621533 kernel: Failed to create system directory nfs Jul 2 07:59:33.517000 audit[3756]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d43017f790 a1=16dba4 a2=55d42e3d42b0 a3=5 items=0 ppid=9 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.662937 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 07:59:33.517000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.721949 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.722063 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.722099 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.724024 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.724108 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.726179 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.726259 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.728240 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.728294 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.729267 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.730449 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.732482 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.732573 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.734698 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.734776 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.735970 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.736912 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.739034 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.739108 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.741240 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.741347 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.743296 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.743367 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.745388 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.745467 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.747672 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.747790 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.750104 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.750190 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.752219 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.752322 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.754282 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.754424 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.756479 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.756561 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.758576 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.758660 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.760786 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.760929 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.762909 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.763005 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.765449 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.765536 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.767713 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.767864 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.769989 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.770072 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.772069 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.772142 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.774188 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.774264 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.776362 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.776440 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.778439 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.778513 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.780982 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.781084 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.783721 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.783845 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.785895 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.785973 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.787964 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.788034 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.790084 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.790269 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.792701 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.793856 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.804337 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.804571 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.806464 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.806552 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.808886 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.808977 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.810957 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.811066 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.813658 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.815089 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.816915 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.816983 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.818982 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.819056 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.821288 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.821344 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.823360 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.823420 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.825892 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.826007 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.828588 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.828684 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.830674 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.830737 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.832865 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.832959 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.701000 audit[3782]: AVC avc: denied { confidentiality } for pid=3782 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:33.835133 kernel: Failed to create system directory nfs4 Jul 2 07:59:33.940723 kubelet[2031]: E0702 07:59:33.934847 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:34.000578 kernel: NFS: Registering the id_resolver key type Jul 2 07:59:34.000796 kernel: Key type id_resolver registered Jul 2 07:59:34.000833 kernel: Key type id_legacy registered Jul 2 07:59:33.701000 audit[3782]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7419141010 a1=20890c a2=557019b382b0 a3=5 items=0 ppid=9 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:33.701000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.018898 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.018959 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.018990 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.021059 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.021144 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.023102 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.023193 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.025276 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.025364 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.027301 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.027346 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.029551 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.029650 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.031943 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.032037 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.034015 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.034089 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.036093 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.036167 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.038111 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.038188 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.040136 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.040202 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.042463 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.042556 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.043422 kernel: Failed to create system directory rpcgss Jul 2 07:59:34.012000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:34.012000 audit[3783]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f610038b010 a1=70bec a2=563c49bc22b0 a3=5 items=0 ppid=9 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.012000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 07:59:34.082095 nfsidmap[3790]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Jul 2 07:59:34.088151 nfsidmap[3792]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Jul 2 07:59:34.102000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.102000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.102000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.102000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.102000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5621729a2340 a2=10 a3=3211db5b0bb2bc81 items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.102000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:34.103000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.103000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5621729a2340 a2=10 a3=3211db5b0bb2bc81 items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.103000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:34.103000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:34.103000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5621729a2340 a2=10 a3=3211db5b0bb2bc81 items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.103000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:34.351347 env[1654]: time="2024-07-02T07:59:34.351293548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c8ba52e0-2767-4afb-9318-043de9d9560a,Namespace:default,Attempt:0,}" Jul 2 07:59:34.600820 (udev-worker)[3791]: Network interface NamePolicy= disabled on kernel command line. Jul 2 07:59:34.607141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:59:34.607407 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 07:59:34.603401 systemd-networkd[1374]: cali5ec59c6bf6e: Link UP Jul 2 07:59:34.607453 systemd-networkd[1374]: cali5ec59c6bf6e: Gained carrier Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.462 [INFO][3798] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.164-k8s-test--pod--1-eth0 default c8ba52e0-2767-4afb-9318-043de9d9560a 1221 0 2024-07-02 07:59:01 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.164 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.463 [INFO][3798] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.507 [INFO][3805] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" HandleID="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Workload="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.536 [INFO][3805] ipam_plugin.go 264: Auto assigning IP ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" HandleID="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Workload="172.31.22.164-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031c6d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.164", "pod":"test-pod-1", "timestamp":"2024-07-02 07:59:34.507431595 +0000 UTC"}, Hostname:"172.31.22.164", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.536 [INFO][3805] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.536 [INFO][3805] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.536 [INFO][3805] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.164' Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.540 [INFO][3805] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.550 [INFO][3805] ipam.go 372: Looking up existing affinities for host host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.560 [INFO][3805] ipam.go 489: Trying affinity for 192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.563 [INFO][3805] ipam.go 155: Attempting to load block cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.570 [INFO][3805] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.50.128/26 host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.571 [INFO][3805] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.50.128/26 handle="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.576 [INFO][3805] ipam.go 1685: Creating new handle: k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0 Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.582 [INFO][3805] ipam.go 1203: Writing block in order to claim IPs block=192.168.50.128/26 handle="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.592 [INFO][3805] ipam.go 1216: Successfully claimed IPs: [192.168.50.133/26] block=192.168.50.128/26 handle="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.592 [INFO][3805] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.50.133/26] handle="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" host="172.31.22.164" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.592 [INFO][3805] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.592 [INFO][3805] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.50.133/26] IPv6=[] ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" HandleID="k8s-pod-network.037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Workload="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.596 [INFO][3798] k8s.go 386: Populated endpoint ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c8ba52e0-2767-4afb-9318-043de9d9560a", ResourceVersion:"1221", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:34.629086 env[1654]: 2024-07-02 07:59:34.596 [INFO][3798] k8s.go 387: Calico CNI using IPs: [192.168.50.133/32] ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.633119 env[1654]: 2024-07-02 07:59:34.596 [INFO][3798] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.633119 env[1654]: 2024-07-02 07:59:34.609 [INFO][3798] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.633119 env[1654]: 2024-07-02 07:59:34.609 [INFO][3798] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.164-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c8ba52e0-2767-4afb-9318-043de9d9560a", ResourceVersion:"1221", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.164", ContainerID:"037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.50.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"96:6d:f1:c5:7f:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:34.633119 env[1654]: 2024-07-02 07:59:34.621 [INFO][3798] k8s.go 500: Wrote updated endpoint to datastore ContainerID="037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.164-k8s-test--pod--1-eth0" Jul 2 07:59:34.658698 env[1654]: time="2024-07-02T07:59:34.658305034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:59:34.658698 env[1654]: time="2024-07-02T07:59:34.658382604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:59:34.658698 env[1654]: time="2024-07-02T07:59:34.658422142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:59:34.671545 env[1654]: time="2024-07-02T07:59:34.659121825Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0 pid=3831 runtime=io.containerd.runc.v2 Jul 2 07:59:34.673000 audit[3841]: NETFILTER_CFG table=filter:91 family=2 entries=42 op=nft_register_chain pid=3841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:59:34.673000 audit[3841]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffe5216e280 a2=0 a3=7ffe5216e26c items=0 ppid=2695 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:59:34.713082 systemd[1]: Started cri-containerd-037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0.scope. Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.742000 audit: BPF prog-id=125 op=LOAD Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3831 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376234333331646264376262633964653133336231343364386531 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3831 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376234333331646264376262633964653133336231343364386531 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit: BPF prog-id=126 op=LOAD Jul 2 07:59:34.743000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b8b40 items=0 ppid=3831 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376234333331646264376262633964653133336231343364386531 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit: BPF prog-id=127 op=LOAD Jul 2 07:59:34.743000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b8b88 items=0 ppid=3831 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376234333331646264376262633964653133336231343364386531 Jul 2 07:59:34.743000 audit: BPF prog-id=127 op=UNLOAD Jul 2 07:59:34.743000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:34.743000 audit: BPF prog-id=128 op=LOAD Jul 2 07:59:34.743000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8f98 items=0 ppid=3831 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:34.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376234333331646264376262633964653133336231343364386531 Jul 2 07:59:34.798370 env[1654]: time="2024-07-02T07:59:34.798318010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c8ba52e0-2767-4afb-9318-043de9d9560a,Namespace:default,Attempt:0,} returns sandbox id \"037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0\"" Jul 2 07:59:34.807188 env[1654]: time="2024-07-02T07:59:34.806431637Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:59:34.861318 kubelet[2031]: E0702 07:59:34.861207 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:34.943266 kubelet[2031]: E0702 07:59:34.943224 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:35.090830 env[1654]: time="2024-07-02T07:59:35.090777034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:35.094816 env[1654]: time="2024-07-02T07:59:35.094770554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:35.097570 env[1654]: time="2024-07-02T07:59:35.097525406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:35.100478 env[1654]: time="2024-07-02T07:59:35.100433557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:35.101296 env[1654]: time="2024-07-02T07:59:35.101255844Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:59:35.109973 systemd[1]: run-containerd-runc-k8s.io-037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0-runc.kHdjy1.mount: Deactivated successfully. Jul 2 07:59:35.114225 env[1654]: time="2024-07-02T07:59:35.113839936Z" level=info msg="CreateContainer within sandbox \"037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 07:59:35.137935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2311234655.mount: Deactivated successfully. Jul 2 07:59:35.151321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount461248286.mount: Deactivated successfully. Jul 2 07:59:35.170504 env[1654]: time="2024-07-02T07:59:35.170438139Z" level=info msg="CreateContainer within sandbox \"037b4331dbd7bbc9de133b143d8e105e80adc8ec71fc31bac356f26b4bfd94a0\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"920f7a6f3d62d7719abf5a135bab0d9b634160f156fe4ba2d6bd7a71a5af4c9e\"" Jul 2 07:59:35.171249 env[1654]: time="2024-07-02T07:59:35.171211330Z" level=info msg="StartContainer for \"920f7a6f3d62d7719abf5a135bab0d9b634160f156fe4ba2d6bd7a71a5af4c9e\"" Jul 2 07:59:35.198848 systemd[1]: Started cri-containerd-920f7a6f3d62d7719abf5a135bab0d9b634160f156fe4ba2d6bd7a71a5af4c9e.scope. Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.216000 audit: BPF prog-id=129 op=LOAD Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3831 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:35.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306637613666336436326437373139616266356131333562616230 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3831 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:35.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306637613666336436326437373139616266356131333562616230 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.217000 audit: BPF prog-id=130 op=LOAD Jul 2 07:59:35.217000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009d550 items=0 ppid=3831 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:35.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306637613666336436326437373139616266356131333562616230 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.218000 audit: BPF prog-id=131 op=LOAD Jul 2 07:59:35.218000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009d598 items=0 ppid=3831 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:35.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306637613666336436326437373139616266356131333562616230 Jul 2 07:59:35.219000 audit: BPF prog-id=131 op=UNLOAD Jul 2 07:59:35.219000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:35.219000 audit: BPF prog-id=132 op=LOAD Jul 2 07:59:35.219000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009d9a8 items=0 ppid=3831 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:35.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306637613666336436326437373139616266356131333562616230 Jul 2 07:59:35.238118 env[1654]: time="2024-07-02T07:59:35.238058975Z" level=info msg="StartContainer for \"920f7a6f3d62d7719abf5a135bab0d9b634160f156fe4ba2d6bd7a71a5af4c9e\" returns successfully" Jul 2 07:59:35.944063 kubelet[2031]: E0702 07:59:35.944012 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:36.231054 systemd-networkd[1374]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 07:59:36.944505 kubelet[2031]: E0702 07:59:36.944446 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:37.945691 kubelet[2031]: E0702 07:59:37.945601 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:38.946715 kubelet[2031]: E0702 07:59:38.946551 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:39.947742 kubelet[2031]: E0702 07:59:39.947517 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:40.948706 kubelet[2031]: E0702 07:59:40.948654 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:41.949433 kubelet[2031]: E0702 07:59:41.949382 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:42.949644 kubelet[2031]: E0702 07:59:42.949572 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:43.950117 kubelet[2031]: E0702 07:59:43.950062 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:44.951202 kubelet[2031]: E0702 07:59:44.951150 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:45.952167 kubelet[2031]: E0702 07:59:45.952119 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:46.952349 kubelet[2031]: E0702 07:59:46.952300 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:47.952856 kubelet[2031]: E0702 07:59:47.952752 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:48.953341 kubelet[2031]: E0702 07:59:48.953194 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:49.953545 kubelet[2031]: E0702 07:59:49.953499 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:50.954551 kubelet[2031]: E0702 07:59:50.954474 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:51.954769 kubelet[2031]: E0702 07:59:51.954717 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:52.955766 kubelet[2031]: E0702 07:59:52.955727 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:53.956338 kubelet[2031]: E0702 07:59:53.956288 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:54.860769 kubelet[2031]: E0702 07:59:54.860719 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:54.957431 kubelet[2031]: E0702 07:59:54.957393 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:55.958618 kubelet[2031]: E0702 07:59:55.958561 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:56.958928 kubelet[2031]: E0702 07:59:56.958890 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:57.959494 kubelet[2031]: E0702 07:59:57.959442 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:58.041420 kubelet[2031]: E0702 07:59:58.041369 2031 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 07:59:58.960436 kubelet[2031]: E0702 07:59:58.960385 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:59.961429 kubelet[2031]: E0702 07:59:59.961295 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:00.961845 kubelet[2031]: E0702 08:00:00.961792 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:01.962267 kubelet[2031]: E0702 08:00:01.962213 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:02.963145 kubelet[2031]: E0702 08:00:02.963091 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:03.963528 kubelet[2031]: E0702 08:00:03.963485 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:04.964054 kubelet[2031]: E0702 08:00:04.964011 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:05.964651 kubelet[2031]: E0702 08:00:05.964592 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:06.964775 kubelet[2031]: E0702 08:00:06.964723 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:07.965639 kubelet[2031]: E0702 08:00:07.965572 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:08.042290 kubelet[2031]: E0702 08:00:08.042226 2031 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 08:00:08.967092 kubelet[2031]: E0702 08:00:08.966975 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:09.967719 kubelet[2031]: E0702 08:00:09.967669 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:10.968229 kubelet[2031]: E0702 08:00:10.968174 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:11.969122 kubelet[2031]: E0702 08:00:11.969051 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:12.969399 kubelet[2031]: E0702 08:00:12.969346 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:13.548000 audit[3584]: AVC avc: denied { watch } for pid=3584 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_59_09.237967490/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c356,c609 tclass=file permissive=0 Jul 2 08:00:13.550140 kernel: kauditd_printk_skb: 461 callbacks suppressed Jul 2 08:00:13.550279 kernel: audit: type=1400 audit(1719907213.548:806): avc: denied { watch } for pid=3584 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_59_09.237967490/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c356,c609 tclass=file permissive=0 Jul 2 08:00:13.548000 audit[3584]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00064dd00 a2=fc6 a3=0 items=0 ppid=3528 pid=3584 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 key=(null) Jul 2 08:00:13.578486 kernel: audit: type=1300 audit(1719907213.548:806): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00064dd00 a2=fc6 a3=0 items=0 ppid=3528 pid=3584 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c609 key=(null) Jul 2 08:00:13.579303 kernel: audit: type=1327 audit(1719907213.548:806): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:00:13.548000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 08:00:13.969599 kubelet[2031]: E0702 08:00:13.969562 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:14.861181 kubelet[2031]: E0702 08:00:14.861132 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:14.971964 kubelet[2031]: E0702 08:00:14.971917 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:15.973837 kubelet[2031]: E0702 08:00:15.973223 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:16.974290 kubelet[2031]: E0702 08:00:16.974248 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:17.975154 kubelet[2031]: E0702 08:00:17.975098 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:18.042599 kubelet[2031]: E0702 08:00:18.042558 2031 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 08:00:18.975645 kubelet[2031]: E0702 08:00:18.975583 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:19.557546 kubelet[2031]: E0702 08:00:19.554501 2031 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": read tcp 172.31.22.164:44452->172.31.21.43:6443: read: connection reset by peer" Jul 2 08:00:19.558010 kubelet[2031]: E0702 08:00:19.557927 2031 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" Jul 2 08:00:19.558010 kubelet[2031]: I0702 08:00:19.557981 2031 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Jul 2 08:00:19.560549 kubelet[2031]: E0702 08:00:19.560528 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" interval="200ms" Jul 2 08:00:19.761609 kubelet[2031]: E0702 08:00:19.761569 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" interval="400ms" Jul 2 08:00:19.976693 kubelet[2031]: E0702 08:00:19.976648 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:20.162873 kubelet[2031]: E0702 08:00:20.162833 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" interval="800ms" Jul 2 08:00:20.560799 kubelet[2031]: E0702 08:00:20.560765 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?resourceVersion=0&timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused - error from a previous attempt: read tcp 172.31.22.164:44452->172.31.21.43:6443: read: connection reset by peer" Jul 2 08:00:20.562294 kubelet[2031]: E0702 08:00:20.562273 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" Jul 2 08:00:20.563987 kubelet[2031]: E0702 08:00:20.563967 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" Jul 2 08:00:20.564701 kubelet[2031]: E0702 08:00:20.564683 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" Jul 2 08:00:20.565542 kubelet[2031]: E0702 08:00:20.565525 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?timeout=10s\": dial tcp 172.31.21.43:6443: connect: connection refused" Jul 2 08:00:20.565679 kubelet[2031]: E0702 08:00:20.565667 2031 kubelet_node_status.go:527] "Unable to update node status" err="update node status exceeds retry count" Jul 2 08:00:20.977711 kubelet[2031]: E0702 08:00:20.977665 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:21.978075 kubelet[2031]: E0702 08:00:21.978017 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:22.979202 kubelet[2031]: E0702 08:00:22.979147 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:23.980141 kubelet[2031]: E0702 08:00:23.980089 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:24.981271 kubelet[2031]: E0702 08:00:24.981214 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:25.982356 kubelet[2031]: E0702 08:00:25.982227 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:26.982729 kubelet[2031]: E0702 08:00:26.982672 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:27.982847 kubelet[2031]: E0702 08:00:27.982789 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:28.983943 kubelet[2031]: E0702 08:00:28.983887 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:29.985149 kubelet[2031]: E0702 08:00:29.985094 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:30.963919 kubelet[2031]: E0702 08:00:30.963875 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Jul 2 08:00:30.985686 kubelet[2031]: E0702 08:00:30.985611 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:31.986384 kubelet[2031]: E0702 08:00:31.986326 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:32.987005 kubelet[2031]: E0702 08:00:32.986950 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:33.262245 systemd[1]: run-containerd-runc-k8s.io-777d58be0de0974d65d700e7c34b3bf88595a8e573bb1baf6cbd258c342ab9ab-runc.KRw8rl.mount: Deactivated successfully. Jul 2 08:00:33.987434 kubelet[2031]: E0702 08:00:33.987377 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:34.860901 kubelet[2031]: E0702 08:00:34.860848 2031 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:34.987869 kubelet[2031]: E0702 08:00:34.987802 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:35.988365 kubelet[2031]: E0702 08:00:35.988315 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:36.989010 kubelet[2031]: E0702 08:00:36.988953 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:37.989857 kubelet[2031]: E0702 08:00:37.989805 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:38.990866 kubelet[2031]: E0702 08:00:38.990815 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:39.991024 kubelet[2031]: E0702 08:00:39.990964 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:40.902160 kubelet[2031]: E0702 08:00:40.902116 2031 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.22.164\": Get \"https://172.31.21.43:6443/api/v1/nodes/172.31.22.164?resourceVersion=0&timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Jul 2 08:00:40.991866 kubelet[2031]: E0702 08:00:40.991809 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:41.992863 kubelet[2031]: E0702 08:00:41.992811 2031 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:00:42.565813 kubelet[2031]: E0702 08:00:42.565770 2031 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.164?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="3.2s"