Jul 2 07:57:35.084055 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:57:35.084108 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:35.084136 kernel: BIOS-provided physical RAM map: Jul 2 07:57:35.084150 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Jul 2 07:57:35.084160 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Jul 2 07:57:35.084172 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Jul 2 07:57:35.084191 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Jul 2 07:57:35.084204 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Jul 2 07:57:35.084217 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Jul 2 07:57:35.084231 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Jul 2 07:57:35.084243 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Jul 2 07:57:35.084255 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Jul 2 07:57:35.084267 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Jul 2 07:57:35.084280 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Jul 2 07:57:35.084299 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Jul 2 07:57:35.084313 kernel: NX (Execute Disable) protection: active Jul 2 07:57:35.084326 kernel: efi: EFI v2.70 by EDK II Jul 2 07:57:35.084339 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd2d2018 Jul 2 07:57:35.084353 kernel: random: crng init done Jul 2 07:57:35.084366 kernel: SMBIOS 2.4 present. Jul 2 07:57:35.084380 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Jul 2 07:57:35.084393 kernel: Hypervisor detected: KVM Jul 2 07:57:35.084411 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:57:35.084426 kernel: kvm-clock: cpu 0, msr 10b192001, primary cpu clock Jul 2 07:57:35.084441 kernel: kvm-clock: using sched offset of 12575639348 cycles Jul 2 07:57:35.084457 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:57:35.084473 kernel: tsc: Detected 2299.998 MHz processor Jul 2 07:57:35.084488 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:57:35.084504 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:57:35.084518 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Jul 2 07:57:35.084534 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:57:35.084548 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Jul 2 07:57:35.084569 kernel: Using GB pages for direct mapping Jul 2 07:57:35.084584 kernel: Secure boot disabled Jul 2 07:57:35.084599 kernel: ACPI: Early table checksum verification disabled Jul 2 07:57:35.084614 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Jul 2 07:57:35.084628 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Jul 2 07:57:35.084643 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Jul 2 07:57:35.084658 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Jul 2 07:57:35.084673 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Jul 2 07:57:35.084698 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Jul 2 07:57:35.084715 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Jul 2 07:57:35.084730 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Jul 2 07:57:35.084756 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Jul 2 07:57:35.084772 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Jul 2 07:57:35.084789 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Jul 2 07:57:35.084808 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Jul 2 07:57:35.084824 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Jul 2 07:57:35.084840 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Jul 2 07:57:35.084856 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Jul 2 07:57:35.084872 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Jul 2 07:57:35.084888 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Jul 2 07:57:35.084904 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Jul 2 07:57:35.084919 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Jul 2 07:57:35.084936 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Jul 2 07:57:35.084956 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:57:35.084972 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:57:35.084988 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:57:35.085003 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Jul 2 07:57:35.085019 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Jul 2 07:57:35.085036 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Jul 2 07:57:35.085052 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Jul 2 07:57:35.085068 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Jul 2 07:57:35.085085 kernel: Zone ranges: Jul 2 07:57:35.085122 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:57:35.085137 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:57:35.085153 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:57:35.085169 kernel: Movable zone start for each node Jul 2 07:57:35.085185 kernel: Early memory node ranges Jul 2 07:57:35.085200 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Jul 2 07:57:35.085216 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Jul 2 07:57:35.085232 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Jul 2 07:57:35.085248 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Jul 2 07:57:35.085269 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:57:35.085285 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Jul 2 07:57:35.085301 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:57:35.085317 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Jul 2 07:57:35.085333 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Jul 2 07:57:35.085349 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Jul 2 07:57:35.085365 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Jul 2 07:57:35.085381 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:57:35.085397 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:57:35.085418 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:57:35.085434 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:57:35.085450 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:57:35.085466 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:57:35.085482 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:57:35.085498 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:57:35.085515 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:57:35.085531 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 2 07:57:35.085546 kernel: Booting paravirtualized kernel on KVM Jul 2 07:57:35.085567 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:57:35.085583 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:57:35.085599 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:57:35.085615 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:57:35.085631 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:57:35.085647 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:57:35.085663 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:57:35.085680 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932280 Jul 2 07:57:35.085696 kernel: Policy zone: Normal Jul 2 07:57:35.085719 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:35.085735 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:57:35.085760 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:57:35.085776 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:57:35.085793 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:57:35.085809 kernel: Memory: 7516812K/7860584K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 343512K reserved, 0K cma-reserved) Jul 2 07:57:35.085831 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:57:35.085846 kernel: Kernel/User page tables isolation: enabled Jul 2 07:57:35.085867 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:57:35.085883 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:57:35.085898 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:57:35.085916 kernel: rcu: RCU event tracing is enabled. Jul 2 07:57:35.085932 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:57:35.085948 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:57:35.085965 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:57:35.085982 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:57:35.085997 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:57:35.086018 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:57:35.086048 kernel: Console: colour dummy device 80x25 Jul 2 07:57:35.086065 kernel: printk: console [ttyS0] enabled Jul 2 07:57:35.086086 kernel: ACPI: Core revision 20210730 Jul 2 07:57:35.086179 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:57:35.086199 kernel: x2apic enabled Jul 2 07:57:35.086216 kernel: Switched APIC routing to physical x2apic. Jul 2 07:57:35.086232 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Jul 2 07:57:35.086248 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:57:35.086265 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Jul 2 07:57:35.086285 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Jul 2 07:57:35.086301 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Jul 2 07:57:35.086317 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:57:35.086333 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 07:57:35.086349 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 07:57:35.086366 kernel: Spectre V2 : Mitigation: IBRS Jul 2 07:57:35.086386 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:57:35.086402 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:57:35.086418 kernel: RETBleed: Mitigation: IBRS Jul 2 07:57:35.086434 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:57:35.086451 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Jul 2 07:57:35.086466 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:57:35.086483 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:57:35.086499 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:57:35.086516 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:57:35.086536 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:57:35.086553 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:57:35.086569 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:57:35.086586 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:57:35.086602 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:57:35.086618 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:57:35.086634 kernel: LSM: Security Framework initializing Jul 2 07:57:35.086650 kernel: SELinux: Initializing. Jul 2 07:57:35.086667 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:57:35.086687 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:57:35.086704 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Jul 2 07:57:35.086722 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Jul 2 07:57:35.086740 kernel: signal: max sigframe size: 1776 Jul 2 07:57:35.086767 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:57:35.086785 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:57:35.086802 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:57:35.086818 kernel: x86: Booting SMP configuration: Jul 2 07:57:35.086833 kernel: .... node #0, CPUs: #1 Jul 2 07:57:35.086853 kernel: kvm-clock: cpu 1, msr 10b192041, secondary cpu clock Jul 2 07:57:35.086871 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:57:35.086888 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:57:35.086904 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:57:35.086921 kernel: smpboot: Max logical packages: 1 Jul 2 07:57:35.086939 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Jul 2 07:57:35.086956 kernel: devtmpfs: initialized Jul 2 07:57:35.086974 kernel: x86/mm: Memory block size: 128MB Jul 2 07:57:35.086992 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Jul 2 07:57:35.087013 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:57:35.087029 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:57:35.087045 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:57:35.087062 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:57:35.087079 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:57:35.087111 kernel: audit: type=2000 audit(1719907053.579:1): state=initialized audit_enabled=0 res=1 Jul 2 07:57:35.087126 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:57:35.089116 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:57:35.089134 kernel: cpuidle: using governor menu Jul 2 07:57:35.089157 kernel: ACPI: bus type PCI registered Jul 2 07:57:35.089173 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:57:35.089189 kernel: dca service started, version 1.12.1 Jul 2 07:57:35.089206 kernel: PCI: Using configuration type 1 for base access Jul 2 07:57:35.089224 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:57:35.089241 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:57:35.089259 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:57:35.089275 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:57:35.089292 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:57:35.089312 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:57:35.089328 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:57:35.089344 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:57:35.089360 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:57:35.089377 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:57:35.089395 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:57:35.089411 kernel: ACPI: Interpreter enabled Jul 2 07:57:35.089427 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:57:35.089443 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:57:35.089463 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:57:35.089479 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:57:35.089496 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:57:35.089736 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:57:35.089923 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:57:35.089945 kernel: PCI host bridge to bus 0000:00 Jul 2 07:57:35.094472 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:57:35.094664 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:57:35.094820 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:57:35.094971 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Jul 2 07:57:35.095162 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:57:35.095349 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:57:35.095529 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Jul 2 07:57:35.095720 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:57:35.095904 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:57:35.096081 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Jul 2 07:57:35.107409 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Jul 2 07:57:35.107596 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Jul 2 07:57:35.107789 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:57:35.107960 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Jul 2 07:57:35.109159 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Jul 2 07:57:35.109366 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:57:35.109537 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:57:35.109718 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Jul 2 07:57:35.109741 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:57:35.109770 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:57:35.109787 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:57:35.109810 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:57:35.109828 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:57:35.109845 kernel: iommu: Default domain type: Translated Jul 2 07:57:35.109862 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:57:35.109879 kernel: vgaarb: loaded Jul 2 07:57:35.109897 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:57:35.109914 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Jul 2 07:57:35.109931 kernel: PTP clock support registered Jul 2 07:57:35.109949 kernel: Registered efivars operations Jul 2 07:57:35.109969 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:57:35.109986 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:57:35.110002 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Jul 2 07:57:35.110020 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Jul 2 07:57:35.110037 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Jul 2 07:57:35.110053 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Jul 2 07:57:35.110070 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:57:35.110087 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:57:35.110119 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:57:35.110140 kernel: pnp: PnP ACPI init Jul 2 07:57:35.110157 kernel: pnp: PnP ACPI: found 7 devices Jul 2 07:57:35.110174 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:57:35.110192 kernel: NET: Registered PF_INET protocol family Jul 2 07:57:35.110209 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:57:35.110226 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:57:35.110243 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:57:35.110261 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:57:35.110278 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:57:35.110298 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:57:35.110315 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:57:35.110333 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:57:35.110350 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:57:35.110367 kernel: NET: Registered PF_XDP protocol family Jul 2 07:57:35.110520 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:57:35.110665 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:57:35.110817 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:57:35.110962 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Jul 2 07:57:35.119543 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:57:35.119579 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:57:35.119599 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:57:35.119618 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Jul 2 07:57:35.119637 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:57:35.119655 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:57:35.119672 kernel: clocksource: Switched to clocksource tsc Jul 2 07:57:35.119697 kernel: Initialise system trusted keyrings Jul 2 07:57:35.119715 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:57:35.119733 kernel: Key type asymmetric registered Jul 2 07:57:35.119761 kernel: Asymmetric key parser 'x509' registered Jul 2 07:57:35.119779 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:57:35.119797 kernel: io scheduler mq-deadline registered Jul 2 07:57:35.119815 kernel: io scheduler kyber registered Jul 2 07:57:35.119833 kernel: io scheduler bfq registered Jul 2 07:57:35.119851 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:57:35.119874 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:57:35.120057 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Jul 2 07:57:35.120081 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:57:35.120276 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Jul 2 07:57:35.120298 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:57:35.120468 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Jul 2 07:57:35.120491 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:57:35.120510 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:57:35.120528 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:57:35.120551 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Jul 2 07:57:35.120569 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Jul 2 07:57:35.120736 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Jul 2 07:57:35.120769 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:57:35.120787 kernel: i8042: Warning: Keylock active Jul 2 07:57:35.120804 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:57:35.120822 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:57:35.120996 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:57:35.122521 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:57:35.122689 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:57:34 UTC (1719907054) Jul 2 07:57:35.122883 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:57:35.122906 kernel: intel_pstate: CPU model not supported Jul 2 07:57:35.122923 kernel: pstore: Registered efi as persistent store backend Jul 2 07:57:35.122939 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:57:35.122956 kernel: Segment Routing with IPv6 Jul 2 07:57:35.122972 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:57:35.122995 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:57:35.123013 kernel: Key type dns_resolver registered Jul 2 07:57:35.123030 kernel: IPI shorthand broadcast: enabled Jul 2 07:57:35.123048 kernel: sched_clock: Marking stable (717710619, 131987408)->(884608115, -34910088) Jul 2 07:57:35.123066 kernel: registered taskstats version 1 Jul 2 07:57:35.123083 kernel: Loading compiled-in X.509 certificates Jul 2 07:57:35.123114 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:57:35.123131 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:57:35.123148 kernel: Key type .fscrypt registered Jul 2 07:57:35.123167 kernel: Key type fscrypt-provisioning registered Jul 2 07:57:35.123183 kernel: pstore: Using crash dump compression: deflate Jul 2 07:57:35.123200 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:57:35.123216 kernel: ima: No architecture policies found Jul 2 07:57:35.123234 kernel: clk: Disabling unused clocks Jul 2 07:57:35.123251 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:57:35.123267 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:57:35.123285 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:57:35.123306 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:57:35.123323 kernel: Run /init as init process Jul 2 07:57:35.123339 kernel: with arguments: Jul 2 07:57:35.123355 kernel: /init Jul 2 07:57:35.123370 kernel: with environment: Jul 2 07:57:35.123386 kernel: HOME=/ Jul 2 07:57:35.123401 kernel: TERM=linux Jul 2 07:57:35.123418 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:57:35.123440 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:57:35.123466 systemd[1]: Detected virtualization kvm. Jul 2 07:57:35.123485 systemd[1]: Detected architecture x86-64. Jul 2 07:57:35.123503 systemd[1]: Running in initrd. Jul 2 07:57:35.123521 systemd[1]: No hostname configured, using default hostname. Jul 2 07:57:35.123539 systemd[1]: Hostname set to <localhost>. Jul 2 07:57:35.123558 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:57:35.123576 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:57:35.123598 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:57:35.123616 systemd[1]: Reached target cryptsetup.target. Jul 2 07:57:35.123634 systemd[1]: Reached target paths.target. Jul 2 07:57:35.123651 systemd[1]: Reached target slices.target. Jul 2 07:57:35.123669 systemd[1]: Reached target swap.target. Jul 2 07:57:35.123687 systemd[1]: Reached target timers.target. Jul 2 07:57:35.123706 systemd[1]: Listening on iscsid.socket. Jul 2 07:57:35.123727 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:57:35.123752 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:57:35.123771 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:57:35.123790 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:57:35.123808 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:57:35.123827 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:57:35.123845 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:57:35.123864 systemd[1]: Reached target sockets.target. Jul 2 07:57:35.123884 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:57:35.123906 systemd[1]: Finished network-cleanup.service. Jul 2 07:57:35.123924 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:57:35.123943 systemd[1]: Starting systemd-journald.service... Jul 2 07:57:35.123979 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:57:35.124001 systemd[1]: Starting systemd-resolved.service... Jul 2 07:57:35.124021 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:57:35.124040 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:57:35.124064 kernel: audit: type=1130 audit(1719907055.089:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.124082 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:57:35.130058 kernel: audit: type=1130 audit(1719907055.095:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.130088 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:57:35.130124 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:57:35.130144 kernel: audit: type=1130 audit(1719907055.114:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.130164 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:57:35.130184 kernel: audit: type=1130 audit(1719907055.123:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.130210 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:57:35.130235 systemd-journald[190]: Journal started Jul 2 07:57:35.130328 systemd-journald[190]: Runtime Journal (/run/log/journal/53d335e31b855d02d2043f620fe08342) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:57:35.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.122264 systemd-modules-load[191]: Inserted module 'overlay' Jul 2 07:57:35.141121 systemd[1]: Started systemd-journald.service. Jul 2 07:57:35.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.149113 kernel: audit: type=1130 audit(1719907055.141:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.172943 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:57:35.201065 kernel: audit: type=1130 audit(1719907055.182:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.201122 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:57:35.201147 kernel: audit: type=1130 audit(1719907055.191:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.201169 kernel: Bridge firewalling registered Jul 2 07:57:35.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.177461 systemd-resolved[192]: Positive Trust Anchors: Jul 2 07:57:35.177478 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:57:35.177541 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:57:35.182027 systemd-resolved[192]: Defaulting to hostname 'linux'. Jul 2 07:57:35.222212 dracut-cmdline[206]: dracut-dracut-053 Jul 2 07:57:35.222212 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:57:35.183718 systemd[1]: Started systemd-resolved.service. Jul 2 07:57:35.245223 kernel: SCSI subsystem initialized Jul 2 07:57:35.192335 systemd[1]: Reached target nss-lookup.target. Jul 2 07:57:35.199211 systemd-modules-load[191]: Inserted module 'br_netfilter' Jul 2 07:57:35.200905 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:57:35.259236 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:57:35.259271 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:57:35.259294 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:57:35.264942 systemd-modules-load[191]: Inserted module 'dm_multipath' Jul 2 07:57:35.266806 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:57:35.272427 kernel: audit: type=1130 audit(1719907055.265:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.268127 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:57:35.283173 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:57:35.293215 kernel: audit: type=1130 audit(1719907055.286:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.321137 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:57:35.342145 kernel: iscsi: registered transport (tcp) Jul 2 07:57:35.368307 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:57:35.368402 kernel: QLogic iSCSI HBA Driver Jul 2 07:57:35.413427 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:57:35.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.415074 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:57:35.473169 kernel: raid6: avx2x4 gen() 18448 MB/s Jul 2 07:57:35.490143 kernel: raid6: avx2x4 xor() 8322 MB/s Jul 2 07:57:35.507137 kernel: raid6: avx2x2 gen() 18432 MB/s Jul 2 07:57:35.524140 kernel: raid6: avx2x2 xor() 18627 MB/s Jul 2 07:57:35.541137 kernel: raid6: avx2x1 gen() 14370 MB/s Jul 2 07:57:35.558139 kernel: raid6: avx2x1 xor() 16196 MB/s Jul 2 07:57:35.575139 kernel: raid6: sse2x4 gen() 11090 MB/s Jul 2 07:57:35.592138 kernel: raid6: sse2x4 xor() 6719 MB/s Jul 2 07:57:35.609134 kernel: raid6: sse2x2 gen() 12099 MB/s Jul 2 07:57:35.626137 kernel: raid6: sse2x2 xor() 7473 MB/s Jul 2 07:57:35.643137 kernel: raid6: sse2x1 gen() 10583 MB/s Jul 2 07:57:35.660694 kernel: raid6: sse2x1 xor() 5203 MB/s Jul 2 07:57:35.660736 kernel: raid6: using algorithm avx2x4 gen() 18448 MB/s Jul 2 07:57:35.660777 kernel: raid6: .... xor() 8322 MB/s, rmw enabled Jul 2 07:57:35.661730 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:57:35.677141 kernel: xor: automatically using best checksumming function avx Jul 2 07:57:35.782146 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:57:35.793319 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:57:35.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.793000 audit: BPF prog-id=7 op=LOAD Jul 2 07:57:35.793000 audit: BPF prog-id=8 op=LOAD Jul 2 07:57:35.795397 systemd[1]: Starting systemd-udevd.service... Jul 2 07:57:35.811533 systemd-udevd[388]: Using default interface naming scheme 'v252'. Jul 2 07:57:35.819017 systemd[1]: Started systemd-udevd.service. Jul 2 07:57:35.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.823486 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:57:35.842877 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Jul 2 07:57:35.879337 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:57:35.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:35.885684 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:57:35.951243 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:57:35.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:36.028122 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:57:36.048119 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:57:36.062139 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Jul 2 07:57:36.120122 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:57:36.121115 kernel: AES CTR mode by8 optimization enabled Jul 2 07:57:36.162603 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Jul 2 07:57:36.162923 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Jul 2 07:57:36.164141 kernel: sd 0:0:1:0: [sda] Write Protect is off Jul 2 07:57:36.164377 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Jul 2 07:57:36.164568 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:57:36.174319 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:57:36.174375 kernel: GPT:17805311 != 25165823 Jul 2 07:57:36.174399 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:57:36.175216 kernel: GPT:17805311 != 25165823 Jul 2 07:57:36.176164 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:57:36.177846 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:57:36.183126 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Jul 2 07:57:36.236966 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:57:36.246251 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (443) Jul 2 07:57:36.254594 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:57:36.261824 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:57:36.266809 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:57:36.268364 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:57:36.276217 systemd[1]: Starting disk-uuid.service... Jul 2 07:57:36.286844 disk-uuid[510]: Primary Header is updated. Jul 2 07:57:36.286844 disk-uuid[510]: Secondary Entries is updated. Jul 2 07:57:36.286844 disk-uuid[510]: Secondary Header is updated. Jul 2 07:57:36.299118 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:57:36.316141 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:57:36.331123 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:57:37.328610 disk-uuid[511]: The operation has completed successfully. Jul 2 07:57:37.332267 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:57:37.405338 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:57:37.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.405489 systemd[1]: Finished disk-uuid.service. Jul 2 07:57:37.423031 systemd[1]: Starting verity-setup.service... Jul 2 07:57:37.449121 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:57:37.517713 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:57:37.520224 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:57:37.531661 systemd[1]: Finished verity-setup.service. Jul 2 07:57:37.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.619150 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:57:37.619325 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:57:37.619816 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:57:37.668678 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:37.668710 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:57:37.668725 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:57:37.668739 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:57:37.620769 systemd[1]: Starting ignition-setup.service... Jul 2 07:57:37.676423 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:57:37.702254 systemd[1]: Finished ignition-setup.service. Jul 2 07:57:37.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.703526 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:57:37.794131 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:57:37.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.803000 audit: BPF prog-id=9 op=LOAD Jul 2 07:57:37.805169 systemd[1]: Starting systemd-networkd.service... Jul 2 07:57:37.839418 systemd-networkd[686]: lo: Link UP Jul 2 07:57:37.839431 systemd-networkd[686]: lo: Gained carrier Jul 2 07:57:37.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.840211 systemd-networkd[686]: Enumeration completed Jul 2 07:57:37.840347 systemd[1]: Started systemd-networkd.service. Jul 2 07:57:37.840817 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:57:37.843084 systemd-networkd[686]: eth0: Link UP Jul 2 07:57:37.843102 systemd-networkd[686]: eth0: Gained carrier Jul 2 07:57:37.853219 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.13/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:57:37.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.854539 systemd[1]: Reached target network.target. Jul 2 07:57:37.951345 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:57:37.951345 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:57:37.951345 iscsid[695]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Jul 2 07:57:37.951345 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:57:37.951345 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:57:37.951345 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:57:37.951345 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:57:37.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:38.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:38.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.870336 systemd[1]: Starting iscsiuio.service... Jul 2 07:57:37.974869 ignition[593]: Ignition 2.14.0 Jul 2 07:57:37.883402 systemd[1]: Started iscsiuio.service. Jul 2 07:57:37.974883 ignition[593]: Stage: fetch-offline Jul 2 07:57:37.924455 systemd[1]: Starting iscsid.service... Jul 2 07:57:38.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.974959 ignition[593]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:38.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.943367 systemd[1]: Started iscsid.service. Jul 2 07:57:37.974997 ignition[593]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:37.959486 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:57:37.991439 ignition[593]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:38.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.978899 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:57:37.991670 ignition[593]: parsed url from cmdline: "" Jul 2 07:57:38.010593 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:57:37.991678 ignition[593]: no config URL provided Jul 2 07:57:38.031629 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:57:38.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:37.991691 ignition[593]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:57:38.046432 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:57:37.991705 ignition[593]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:57:38.063412 systemd[1]: Reached target remote-fs.target. Jul 2 07:57:37.991715 ignition[593]: failed to fetch config: resource requires networking Jul 2 07:57:38.082479 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:57:37.991879 ignition[593]: Ignition finished successfully Jul 2 07:57:38.106299 systemd[1]: Starting ignition-fetch.service... Jul 2 07:57:38.116878 ignition[710]: Ignition 2.14.0 Jul 2 07:57:38.132768 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:57:38.116889 ignition[710]: Stage: fetch Jul 2 07:57:38.135946 unknown[710]: fetched base config from "system" Jul 2 07:57:38.117010 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:38.135954 unknown[710]: fetched base config from "system" Jul 2 07:57:38.117041 ignition[710]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:38.135961 unknown[710]: fetched user config from "gcp" Jul 2 07:57:38.125894 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:38.147502 systemd[1]: Finished ignition-fetch.service. Jul 2 07:57:38.126084 ignition[710]: parsed url from cmdline: "" Jul 2 07:57:38.163418 systemd[1]: Starting ignition-kargs.service... Jul 2 07:57:38.126091 ignition[710]: no config URL provided Jul 2 07:57:38.187636 systemd[1]: Finished ignition-kargs.service. Jul 2 07:57:38.126130 ignition[710]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:57:38.204526 systemd[1]: Starting ignition-disks.service... Jul 2 07:57:38.126145 ignition[710]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:57:38.236591 systemd[1]: Finished ignition-disks.service. Jul 2 07:57:38.126182 ignition[710]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Jul 2 07:57:38.251392 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:57:38.132640 ignition[710]: GET result: OK Jul 2 07:57:38.267213 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:57:38.132704 ignition[710]: parsing config with SHA512: 6fe707b8218533a693956ede0afdd0e41d72392553fe9ef6e43c1b3df2760fc0796ddd59ec31ed1c079efc18f419fe015955df3f61e8c97c175a56ed1edc0440 Jul 2 07:57:38.282209 systemd[1]: Reached target local-fs.target. Jul 2 07:57:38.136512 ignition[710]: fetch: fetch complete Jul 2 07:57:38.296298 systemd[1]: Reached target sysinit.target. Jul 2 07:57:38.136520 ignition[710]: fetch: fetch passed Jul 2 07:57:38.310231 systemd[1]: Reached target basic.target. Jul 2 07:57:38.136599 ignition[710]: Ignition finished successfully Jul 2 07:57:38.323395 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:57:38.176857 ignition[716]: Ignition 2.14.0 Jul 2 07:57:38.176868 ignition[716]: Stage: kargs Jul 2 07:57:38.176989 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:38.177014 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:38.183338 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:38.184369 ignition[716]: kargs: kargs passed Jul 2 07:57:38.184420 ignition[716]: Ignition finished successfully Jul 2 07:57:38.215768 ignition[722]: Ignition 2.14.0 Jul 2 07:57:38.215779 ignition[722]: Stage: disks Jul 2 07:57:38.215915 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:38.215941 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:38.223861 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:38.225043 ignition[722]: disks: disks passed Jul 2 07:57:38.225088 ignition[722]: Ignition finished successfully Jul 2 07:57:38.369440 systemd-fsck[730]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 07:57:38.586005 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:57:38.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:38.595279 systemd[1]: Mounting sysroot.mount... Jul 2 07:57:38.625265 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:57:38.620630 systemd[1]: Mounted sysroot.mount. Jul 2 07:57:38.632540 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:57:38.650844 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:57:38.662761 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:57:38.662818 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:57:38.662851 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:57:38.753261 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (736) Jul 2 07:57:38.753298 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:38.753322 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:57:38.753345 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:57:38.678472 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:57:38.773275 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:57:38.699733 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:57:38.789283 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:57:38.746357 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:57:38.807243 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:57:38.769583 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:57:38.826243 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:57:38.836243 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:57:38.843040 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:57:38.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:38.847333 systemd[1]: Starting ignition-mount.service... Jul 2 07:57:38.868400 systemd[1]: Starting sysroot-boot.service... Jul 2 07:57:38.882787 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:38.882936 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:38.909254 ignition[802]: INFO : Ignition 2.14.0 Jul 2 07:57:38.909254 ignition[802]: INFO : Stage: mount Jul 2 07:57:38.909254 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:38.909254 ignition[802]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:39.019325 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812) Jul 2 07:57:39.019377 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:57:39.019393 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:57:39.019407 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:57:39.019421 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:57:38.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:38.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.019538 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:39.019538 ignition[802]: INFO : mount: mount passed Jul 2 07:57:39.019538 ignition[802]: INFO : Ignition finished successfully Jul 2 07:57:38.913190 systemd[1]: Finished sysroot-boot.service. Jul 2 07:57:38.925248 systemd-networkd[686]: eth0: Gained IPv6LL Jul 2 07:57:38.925561 systemd[1]: Finished ignition-mount.service. Jul 2 07:57:38.935311 systemd[1]: Starting ignition-files.service... Jul 2 07:57:39.090253 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (835) Jul 2 07:57:39.090344 ignition[831]: INFO : Ignition 2.14.0 Jul 2 07:57:39.090344 ignition[831]: INFO : Stage: files Jul 2 07:57:39.090344 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:39.090344 ignition[831]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:39.090344 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:39.090344 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:57:39.090344 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:57:39.090344 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:57:39.090344 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:57:39.090344 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:57:39.090344 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem944643867" Jul 2 07:57:39.090344 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem944643867": device or resource busy Jul 2 07:57:39.090344 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem944643867", trying btrfs: device or resource busy Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem944643867" Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem944643867" Jul 2 07:57:39.090344 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem944643867" Jul 2 07:57:38.951912 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem944643867" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465337038" Jul 2 07:57:39.359211 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465337038": device or resource busy Jul 2 07:57:39.359211 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1465337038", trying btrfs: device or resource busy Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465337038" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465337038" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem1465337038" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem1465337038" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:57:39.359211 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:57:39.012045 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218223480" Jul 2 07:57:39.611266 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218223480": device or resource busy Jul 2 07:57:39.611266 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1218223480", trying btrfs: device or resource busy Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218223480" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218223480" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1218223480" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1218223480" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:57:39.611266 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:57:39.065125 unknown[831]: wrote ssh authorized keys file for user: core Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4248668114" Jul 2 07:57:39.865313 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4248668114": device or resource busy Jul 2 07:57:39.865313 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4248668114", trying btrfs: device or resource busy Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4248668114" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4248668114" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4248668114" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4248668114" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 07:57:39.865313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Jul 2 07:57:40.260331 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 07:57:40.260384 kernel: audit: type=1130 audit(1719907059.889:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.260403 kernel: audit: type=1130 audit(1719907059.983:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.260420 kernel: audit: type=1130 audit(1719907060.028:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.260441 kernel: audit: type=1131 audit(1719907060.028:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.260455 kernel: audit: type=1130 audit(1719907060.151:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.260469 kernel: audit: type=1131 audit(1719907060.151:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.880576 systemd[1]: Finished ignition-files.service. Jul 2 07:57:40.274381 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(18): [started] processing unit "oem-gce.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce.service" Jul 2 07:57:40.274381 ignition[831]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:57:40.274381 ignition[831]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:57:40.274381 ignition[831]: INFO : files: files passed Jul 2 07:57:40.274381 ignition[831]: INFO : Ignition finished successfully Jul 2 07:57:40.617233 kernel: audit: type=1130 audit(1719907060.281:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.617293 kernel: audit: type=1131 audit(1719907060.390:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.899274 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:57:39.940232 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:57:40.660245 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:57:39.941321 systemd[1]: Starting ignition-quench.service... Jul 2 07:57:40.716288 kernel: audit: type=1131 audit(1719907060.688:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.959700 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:57:39.984771 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:57:40.768260 kernel: audit: type=1131 audit(1719907060.739:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:39.984907 systemd[1]: Finished ignition-quench.service. Jul 2 07:57:40.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.029618 systemd[1]: Reached target ignition-complete.target. Jul 2 07:57:40.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.113380 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:57:40.147769 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:57:40.820343 ignition[869]: INFO : Ignition 2.14.0 Jul 2 07:57:40.820343 ignition[869]: INFO : Stage: umount Jul 2 07:57:40.820343 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:57:40.820343 ignition[869]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:57:40.820343 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:57:40.820343 ignition[869]: INFO : umount: umount passed Jul 2 07:57:40.820343 ignition[869]: INFO : Ignition finished successfully Jul 2 07:57:40.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.147883 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:57:40.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.152601 systemd[1]: Reached target initrd-fs.target. Jul 2 07:57:40.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.216438 systemd[1]: Reached target initrd.target. Jul 2 07:57:40.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.242472 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:57:40.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.243632 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:57:40.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.267508 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:57:41.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.283496 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:57:41.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.329014 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:57:40.338508 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:57:40.356578 systemd[1]: Stopped target timers.target. Jul 2 07:57:40.374527 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:57:40.374704 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:57:40.391738 systemd[1]: Stopped target initrd.target. Jul 2 07:57:40.436404 systemd[1]: Stopped target basic.target. Jul 2 07:57:41.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.455408 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:57:41.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.477523 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:57:40.510539 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:57:40.542530 systemd[1]: Stopped target remote-fs.target. Jul 2 07:57:41.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.554629 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:57:41.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.575554 systemd[1]: Stopped target sysinit.target. Jul 2 07:57:41.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:41.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:41.213000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:57:40.609536 systemd[1]: Stopped target local-fs.target. Jul 2 07:57:40.625492 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:57:40.643503 systemd[1]: Stopped target swap.target. Jul 2 07:57:41.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.667431 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:57:41.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.667617 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:57:41.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.689539 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:57:40.724445 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:57:41.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.724628 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:57:40.740625 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:57:40.740824 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:57:41.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.778563 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:57:41.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.778759 systemd[1]: Stopped ignition-files.service. Jul 2 07:57:41.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.794706 systemd[1]: Stopping ignition-mount.service... Jul 2 07:57:40.827253 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:57:40.827488 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:57:41.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.843764 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:57:41.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.880417 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:57:41.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:41.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:40.880659 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:57:40.895797 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:57:40.895996 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:57:40.926690 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:57:41.541379 systemd-journald[190]: Received SIGTERM from PID 1 (systemd). Jul 2 07:57:40.927857 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:57:41.551235 iscsid[695]: iscsid shutting down. Jul 2 07:57:40.927963 systemd[1]: Stopped ignition-mount.service. Jul 2 07:57:40.938763 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:57:40.938863 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:57:40.953953 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:57:40.954087 systemd[1]: Stopped ignition-disks.service. Jul 2 07:57:40.968271 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:57:40.968347 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:57:40.987283 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:57:40.987359 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:57:41.003275 systemd[1]: Stopped target network.target. Jul 2 07:57:41.003346 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:57:41.003402 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:57:41.023307 systemd[1]: Stopped target paths.target. Jul 2 07:57:41.037210 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:57:41.041180 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:57:41.052216 systemd[1]: Stopped target slices.target. Jul 2 07:57:41.066209 systemd[1]: Stopped target sockets.target. Jul 2 07:57:41.078265 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:57:41.078325 systemd[1]: Closed iscsid.socket. Jul 2 07:57:41.093292 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:57:41.093348 systemd[1]: Closed iscsiuio.socket. Jul 2 07:57:41.107255 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:57:41.107349 systemd[1]: Stopped ignition-setup.service. Jul 2 07:57:41.122304 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:57:41.122381 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:57:41.137493 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:57:41.141149 systemd-networkd[686]: eth0: DHCPv6 lease lost Jul 2 07:57:41.152472 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:57:41.167761 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:57:41.167879 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:57:41.183990 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:57:41.184127 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:57:41.198928 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:57:41.199033 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:57:41.215359 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:57:41.215404 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:57:41.230245 systemd[1]: Stopping network-cleanup.service... Jul 2 07:57:41.243182 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:57:41.243281 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:57:41.257327 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:57:41.257390 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:57:41.272434 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:57:41.272493 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:57:41.288420 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:57:41.303737 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:57:41.304406 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:57:41.304561 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:57:41.318519 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:57:41.318611 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:57:41.333412 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:57:41.333464 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:57:41.348347 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:57:41.348416 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:57:41.358461 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:57:41.358520 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:57:41.382400 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:57:41.382464 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:57:41.399436 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:57:41.420255 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:57:41.420369 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:57:41.438913 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:57:41.439037 systemd[1]: Stopped network-cleanup.service. Jul 2 07:57:41.453712 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:57:41.453824 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:57:41.469595 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:57:41.488385 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:57:41.510164 systemd[1]: Switching root. Jul 2 07:57:41.554391 systemd-journald[190]: Journal stopped Jul 2 07:57:46.228003 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:57:46.228152 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:57:46.228181 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:57:46.228210 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:57:46.228243 kernel: SELinux: policy capability open_perms=1 Jul 2 07:57:46.228270 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:57:46.228300 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:57:46.228323 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:57:46.228347 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:57:46.228369 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:57:46.228391 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:57:46.228416 systemd[1]: Successfully loaded SELinux policy in 111.239ms. Jul 2 07:57:46.228461 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.359ms. Jul 2 07:57:46.228491 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:57:46.228516 systemd[1]: Detected virtualization kvm. Jul 2 07:57:46.228540 systemd[1]: Detected architecture x86-64. Jul 2 07:57:46.228563 systemd[1]: Detected first boot. Jul 2 07:57:46.228587 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:57:46.228613 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:57:46.228636 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:57:46.228666 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:46.228691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:46.228722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:46.228752 kernel: kauditd_printk_skb: 46 callbacks suppressed Jul 2 07:57:46.228776 kernel: audit: type=1334 audit(1719907065.321:86): prog-id=12 op=LOAD Jul 2 07:57:46.228798 kernel: audit: type=1334 audit(1719907065.321:87): prog-id=3 op=UNLOAD Jul 2 07:57:46.228820 kernel: audit: type=1334 audit(1719907065.327:88): prog-id=13 op=LOAD Jul 2 07:57:46.228842 kernel: audit: type=1334 audit(1719907065.333:89): prog-id=14 op=LOAD Jul 2 07:57:46.228868 kernel: audit: type=1334 audit(1719907065.333:90): prog-id=4 op=UNLOAD Jul 2 07:57:46.228890 kernel: audit: type=1334 audit(1719907065.333:91): prog-id=5 op=UNLOAD Jul 2 07:57:46.228913 kernel: audit: type=1334 audit(1719907065.340:92): prog-id=15 op=LOAD Jul 2 07:57:46.228934 kernel: audit: type=1334 audit(1719907065.341:93): prog-id=12 op=UNLOAD Jul 2 07:57:46.228956 kernel: audit: type=1334 audit(1719907065.347:94): prog-id=16 op=LOAD Jul 2 07:57:46.228980 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:57:46.229005 kernel: audit: type=1334 audit(1719907065.375:95): prog-id=17 op=LOAD Jul 2 07:57:46.229027 systemd[1]: Stopped iscsiuio.service. Jul 2 07:57:46.229060 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:57:46.229086 systemd[1]: Stopped iscsid.service. Jul 2 07:57:46.229131 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:57:46.229156 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:57:46.229184 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:57:46.229216 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:57:46.229241 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:57:46.229266 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:57:46.229291 systemd[1]: Created slice system-getty.slice. Jul 2 07:57:46.229315 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:57:46.229338 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:57:46.229363 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:57:46.229388 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:57:46.229410 systemd[1]: Created slice user.slice. Jul 2 07:57:46.229434 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:57:46.229458 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:57:46.229481 systemd[1]: Set up automount boot.automount. Jul 2 07:57:46.229508 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:57:46.229532 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:57:46.229554 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:57:46.229577 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:57:46.229599 systemd[1]: Reached target integritysetup.target. Jul 2 07:57:46.229623 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:57:46.229646 systemd[1]: Reached target remote-fs.target. Jul 2 07:57:46.229673 systemd[1]: Reached target slices.target. Jul 2 07:57:46.229696 systemd[1]: Reached target swap.target. Jul 2 07:57:46.229720 systemd[1]: Reached target torcx.target. Jul 2 07:57:46.229748 systemd[1]: Reached target veritysetup.target. Jul 2 07:57:46.229772 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:57:46.229795 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:57:46.229819 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:57:46.229843 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:57:46.229868 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:57:46.229892 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:57:46.229917 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:57:46.229939 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:57:46.229968 systemd[1]: Mounting media.mount... Jul 2 07:57:46.229993 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:46.230015 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:57:46.230039 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:57:46.230069 systemd[1]: Mounting tmp.mount... Jul 2 07:57:46.230117 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:57:46.230141 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:46.230164 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:57:46.230188 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:57:46.230216 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:46.230241 systemd[1]: Starting modprobe@drm.service... Jul 2 07:57:46.230266 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:46.230289 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:57:46.230313 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:46.230335 kernel: fuse: init (API version 7.34) Jul 2 07:57:46.230359 kernel: loop: module loaded Jul 2 07:57:46.230383 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:57:46.230407 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:57:46.230435 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:57:46.230460 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:57:46.230481 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:57:46.230504 systemd[1]: Stopped systemd-journald.service. Jul 2 07:57:46.230527 systemd[1]: Starting systemd-journald.service... Jul 2 07:57:46.230549 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:57:46.230572 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:57:46.230600 systemd-journald[993]: Journal started Jul 2 07:57:46.230693 systemd-journald[993]: Runtime Journal (/run/log/journal/53d335e31b855d02d2043f620fe08342) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:57:41.553000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:57:41.856000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:57:42.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:57:42.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:57:42.003000 audit: BPF prog-id=10 op=LOAD Jul 2 07:57:42.003000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:57:42.003000 audit: BPF prog-id=11 op=LOAD Jul 2 07:57:42.003000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:57:42.171000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:57:42.171000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.171000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:57:42.182000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:57:42.182000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:42.182000 audit: CWD cwd="/" Jul 2 07:57:42.182000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:42.182000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:42.182000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:57:45.321000 audit: BPF prog-id=12 op=LOAD Jul 2 07:57:45.321000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:57:45.327000 audit: BPF prog-id=13 op=LOAD Jul 2 07:57:45.333000 audit: BPF prog-id=14 op=LOAD Jul 2 07:57:45.333000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:57:45.333000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:57:45.340000 audit: BPF prog-id=15 op=LOAD Jul 2 07:57:45.341000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:57:45.347000 audit: BPF prog-id=16 op=LOAD Jul 2 07:57:45.375000 audit: BPF prog-id=17 op=LOAD Jul 2 07:57:45.375000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:57:45.375000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:57:45.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.409000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:57:45.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:45.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.185000 audit: BPF prog-id=18 op=LOAD Jul 2 07:57:46.185000 audit: BPF prog-id=19 op=LOAD Jul 2 07:57:46.185000 audit: BPF prog-id=20 op=LOAD Jul 2 07:57:46.185000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:57:46.185000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:57:46.216000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:57:46.216000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffff9aea290 a2=4000 a3=7ffff9aea32c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:46.216000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:57:45.320608 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:57:42.167542 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:45.385714 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:57:42.168631 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:57:42.168662 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:57:42.168708 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:57:42.168721 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:57:42.168762 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:57:42.168777 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:57:42.169010 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:57:42.169057 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:57:42.169073 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:57:42.171583 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:57:42.171628 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:57:42.171652 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:57:42.171670 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:57:42.171692 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:57:42.171709 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:57:44.727689 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:44.727989 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:44.728735 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:44.729030 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:57:44.729110 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:57:44.729184 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-07-02T07:57:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:57:46.244167 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:57:46.259132 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:57:46.273121 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:57:46.279135 systemd[1]: Stopped verity-setup.service. Jul 2 07:57:46.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.299281 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:46.308137 systemd[1]: Started systemd-journald.service. Jul 2 07:57:46.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.316548 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:57:46.323516 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:57:46.330375 systemd[1]: Mounted media.mount. Jul 2 07:57:46.337378 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:57:46.345367 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:57:46.353312 systemd[1]: Mounted tmp.mount. Jul 2 07:57:46.360453 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:57:46.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.370568 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:57:46.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.380554 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:57:46.380753 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:57:46.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.389558 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:46.389751 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:46.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.398565 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:57:46.398770 systemd[1]: Finished modprobe@drm.service. Jul 2 07:57:46.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.407555 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:46.407748 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:46.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.416535 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:57:46.416735 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:57:46.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.425542 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:46.425731 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:46.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.434530 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:57:46.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.443490 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:57:46.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.452505 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:57:46.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.461603 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:57:46.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.471871 systemd[1]: Reached target network-pre.target. Jul 2 07:57:46.481558 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:57:46.491538 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:57:46.498228 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:57:46.501984 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:57:46.510783 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:57:46.519276 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:46.520911 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:57:46.528275 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:46.529944 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:57:46.533444 systemd-journald[993]: Time spent on flushing to /var/log/journal/53d335e31b855d02d2043f620fe08342 is 61.229ms for 1132 entries. Jul 2 07:57:46.533444 systemd-journald[993]: System Journal (/var/log/journal/53d335e31b855d02d2043f620fe08342) is 8.0M, max 584.8M, 576.8M free. Jul 2 07:57:46.640423 systemd-journald[993]: Received client request to flush runtime journal. Jul 2 07:57:46.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:46.546944 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:57:46.555788 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:57:46.566668 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:57:46.642945 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:57:46.575381 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:57:46.584573 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:57:46.593693 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:57:46.605830 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:57:46.623211 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:57:46.641711 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:57:46.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.218971 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:57:47.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.226000 audit: BPF prog-id=21 op=LOAD Jul 2 07:57:47.227000 audit: BPF prog-id=22 op=LOAD Jul 2 07:57:47.227000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:57:47.227000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:57:47.229043 systemd[1]: Starting systemd-udevd.service... Jul 2 07:57:47.252145 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Jul 2 07:57:47.300539 systemd[1]: Started systemd-udevd.service. Jul 2 07:57:47.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.310000 audit: BPF prog-id=23 op=LOAD Jul 2 07:57:47.312478 systemd[1]: Starting systemd-networkd.service... Jul 2 07:57:47.328000 audit: BPF prog-id=24 op=LOAD Jul 2 07:57:47.328000 audit: BPF prog-id=25 op=LOAD Jul 2 07:57:47.328000 audit: BPF prog-id=26 op=LOAD Jul 2 07:57:47.330880 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:57:47.375377 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:57:47.413533 systemd[1]: Started systemd-userdbd.service. Jul 2 07:57:47.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.504186 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:57:47.476000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:57:47.476000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564d5c95b920 a1=3207c a2=7f2b89ec9bc5 a3=5 items=108 ppid=1010 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:47.476000 audit: CWD cwd="/" Jul 2 07:57:47.476000 audit: PATH item=0 name=(null) inode=31 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=1 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=2 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=3 name=(null) inode=13986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=4 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=5 name=(null) inode=13987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=6 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=7 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=8 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=9 name=(null) inode=13989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=10 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=11 name=(null) inode=13990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=12 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=13 name=(null) inode=13991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=14 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=15 name=(null) inode=13992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=16 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=17 name=(null) inode=13993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=18 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=19 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=20 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=21 name=(null) inode=13995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=22 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=23 name=(null) inode=13996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=24 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=25 name=(null) inode=13997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=26 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=27 name=(null) inode=13998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.566827 systemd-networkd[1023]: lo: Link UP Jul 2 07:57:47.567224 systemd-networkd[1023]: lo: Gained carrier Jul 2 07:57:47.568082 systemd-networkd[1023]: Enumeration completed Jul 2 07:57:47.568398 systemd[1]: Started systemd-networkd.service. Jul 2 07:57:47.568775 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:57:47.476000 audit: PATH item=28 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=29 name=(null) inode=13999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=30 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=31 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=32 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=33 name=(null) inode=14001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.570858 systemd-networkd[1023]: eth0: Link UP Jul 2 07:57:47.571004 systemd-networkd[1023]: eth0: Gained carrier Jul 2 07:57:47.476000 audit: PATH item=34 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=35 name=(null) inode=14002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=36 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=37 name=(null) inode=14003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=38 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=39 name=(null) inode=14004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=40 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=41 name=(null) inode=14005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=42 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=43 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=44 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=45 name=(null) inode=14007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=46 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=47 name=(null) inode=14008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=48 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=49 name=(null) inode=14009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=50 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=51 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=52 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=53 name=(null) inode=14011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=54 name=(null) inode=31 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=55 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=56 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=57 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=58 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=59 name=(null) inode=14014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=60 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=61 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=62 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=63 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=64 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=65 name=(null) inode=14017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=66 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=67 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=68 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=69 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=70 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=71 name=(null) inode=14020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=72 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=73 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=74 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=75 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=76 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=77 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=78 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=79 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=80 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=81 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=82 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=83 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=84 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=85 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=86 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=87 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=88 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=89 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=90 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=91 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=92 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=93 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=94 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=95 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=96 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=97 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=98 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=99 name=(null) inode=14034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=100 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=101 name=(null) inode=14035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=102 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=103 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=104 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=105 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=106 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PATH item=107 name=(null) inode=14038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:47.476000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:57:47.592067 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1038) Jul 2 07:57:47.592176 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:57:47.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.592337 systemd-networkd[1023]: eth0: DHCPv4 address 10.128.0.13/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:57:47.608119 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Jul 2 07:57:47.642121 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:57:47.663666 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 07:57:47.663782 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Jul 2 07:57:47.663562 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:57:47.697963 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:57:47.698082 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:57:47.726647 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:57:47.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.736890 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:57:47.765689 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:57:47.794443 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:57:47.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.803413 systemd[1]: Reached target cryptsetup.target. Jul 2 07:57:47.813666 systemd[1]: Starting lvm2-activation.service... Jul 2 07:57:47.819779 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:57:47.849476 systemd[1]: Finished lvm2-activation.service. Jul 2 07:57:47.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.858417 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:57:47.867267 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:57:47.867318 systemd[1]: Reached target local-fs.target. Jul 2 07:57:47.875231 systemd[1]: Reached target machines.target. Jul 2 07:57:47.884713 systemd[1]: Starting ldconfig.service... Jul 2 07:57:47.893320 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:47.893403 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:47.895073 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:57:47.903722 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:57:47.916075 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:57:47.918286 systemd[1]: Starting systemd-sysext.service... Jul 2 07:57:47.919214 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Jul 2 07:57:47.921225 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:57:47.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:47.942291 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:57:47.949872 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:57:47.959063 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:57:47.959348 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:57:47.983438 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 07:57:48.064228 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) Jul 2 07:57:48.064228 systemd-fsck[1060]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:57:48.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.066807 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:57:48.078394 systemd[1]: Mounting boot.mount... Jul 2 07:57:48.125597 systemd[1]: Mounted boot.mount. Jul 2 07:57:48.146796 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:57:48.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.295932 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:57:48.296730 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:57:48.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.324136 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:57:48.353135 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 07:57:48.374726 (sd-sysext)[1066]: Using extensions 'kubernetes'. Jul 2 07:57:48.375420 (sd-sysext)[1066]: Merged extensions into '/usr'. Jul 2 07:57:48.399665 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:48.402677 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:57:48.409443 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:48.411633 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:48.420704 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:48.429822 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:48.437275 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:48.437508 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:48.437743 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:48.442144 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:57:48.450723 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:48.450970 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:48.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.459790 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:48.459932 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:48.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.468841 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:48.469034 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:48.474082 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:57:48.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.478051 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:48.478204 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:48.479637 systemd[1]: Finished ldconfig.service. Jul 2 07:57:48.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.487550 systemd[1]: Finished systemd-sysext.service. Jul 2 07:57:48.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.497876 systemd[1]: Starting ensure-sysext.service... Jul 2 07:57:48.506559 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:57:48.518735 systemd[1]: Reloading. Jul 2 07:57:48.534192 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:57:48.541897 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:57:48.551895 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:57:48.630744 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2024-07-02T07:57:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:48.638325 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2024-07-02T07:57:48Z" level=info msg="torcx already run" Jul 2 07:57:48.717274 systemd-networkd[1023]: eth0: Gained IPv6LL Jul 2 07:57:48.783571 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:48.783816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:48.817347 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:48.892000 audit: BPF prog-id=27 op=LOAD Jul 2 07:57:48.892000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:57:48.892000 audit: BPF prog-id=28 op=LOAD Jul 2 07:57:48.892000 audit: BPF prog-id=29 op=LOAD Jul 2 07:57:48.892000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:57:48.892000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:57:48.894000 audit: BPF prog-id=30 op=LOAD Jul 2 07:57:48.894000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:57:48.894000 audit: BPF prog-id=31 op=LOAD Jul 2 07:57:48.894000 audit: BPF prog-id=32 op=LOAD Jul 2 07:57:48.894000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:57:48.894000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:57:48.896000 audit: BPF prog-id=33 op=LOAD Jul 2 07:57:48.896000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:57:48.898000 audit: BPF prog-id=34 op=LOAD Jul 2 07:57:48.898000 audit: BPF prog-id=35 op=LOAD Jul 2 07:57:48.898000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:57:48.898000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:57:48.902714 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:57:48.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.917539 systemd[1]: Starting audit-rules.service... Jul 2 07:57:48.925679 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:57:48.935957 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:57:48.947254 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:57:48.955000 audit: BPF prog-id=36 op=LOAD Jul 2 07:57:48.957851 systemd[1]: Starting systemd-resolved.service... Jul 2 07:57:48.965000 audit: BPF prog-id=37 op=LOAD Jul 2 07:57:48.968076 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:57:48.977179 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:57:48.988162 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:57:48.990000 audit[1164]: SYSTEM_BOOT pid=1164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:57:48.995149 augenrules[1167]: No rules Jul 2 07:57:48.993000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:57:48.993000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8663a9b0 a2=420 a3=0 items=0 ppid=1137 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.993000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:57:48.996800 systemd[1]: Finished audit-rules.service. Jul 2 07:57:49.004622 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:57:49.004862 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:57:49.013600 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:57:49.032837 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:49.033409 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.037419 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:49.046307 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:49.055074 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:49.063847 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:57:49.072298 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.075783 enable-oslogin[1175]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:57:49.072534 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:49.074905 systemd[1]: Starting systemd-update-done.service... Jul 2 07:57:49.082208 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:57:49.082406 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:49.084819 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:57:49.095005 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:49.095224 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:49.103948 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:49.104173 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:49.112970 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:49.113199 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:49.121856 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:57:49.122084 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:57:49.131170 systemd[1]: Finished systemd-update-done.service. Jul 2 07:57:49.141321 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:49.141530 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.144584 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:49.145018 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.149743 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:57:49.157351 systemd-resolved[1156]: Positive Trust Anchors: Jul 2 07:57:49.157710 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:57:49.157882 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:57:49.159280 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:57:49.168401 systemd[1]: Starting modprobe@loop.service... Jul 2 07:57:49.169865 systemd-resolved[1156]: Defaulting to hostname 'linux'. Jul 2 07:57:49.177162 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:57:49.183120 enable-oslogin[1180]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:57:49.185278 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.185529 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:49.185717 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:57:49.185883 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:57:49.187728 systemd[1]: Started systemd-resolved.service. Jul 2 07:57:49.196912 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:57:49.197166 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:57:49.205875 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:57:49.206124 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:57:49.212757 systemd-timesyncd[1160]: Contacted time server 169.254.169.254:123 (169.254.169.254). Jul 2 07:57:49.213085 systemd-timesyncd[1160]: Initial clock synchronization to Tue 2024-07-02 07:57:48.877428 UTC. Jul 2 07:57:49.214504 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:57:49.224158 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:57:49.224373 systemd[1]: Finished modprobe@loop.service. Jul 2 07:57:49.232718 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:57:49.232950 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:57:49.241888 systemd[1]: Reached target network.target. Jul 2 07:57:49.251337 systemd[1]: Reached target nss-lookup.target. Jul 2 07:57:49.259320 systemd[1]: Reached target time-set.target. Jul 2 07:57:49.267299 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:57:49.267551 systemd[1]: Reached target sysinit.target. Jul 2 07:57:49.276465 systemd[1]: Started motdgen.path. Jul 2 07:57:49.283428 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:57:49.293602 systemd[1]: Started logrotate.timer. Jul 2 07:57:49.300550 systemd[1]: Started mdadm.timer. Jul 2 07:57:49.307377 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:57:49.316319 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:57:49.316593 systemd[1]: Reached target paths.target. Jul 2 07:57:49.323342 systemd[1]: Reached target timers.target. Jul 2 07:57:49.330824 systemd[1]: Listening on dbus.socket. Jul 2 07:57:49.340014 systemd[1]: Starting docker.socket... Jul 2 07:57:49.351183 systemd[1]: Listening on sshd.socket. Jul 2 07:57:49.358487 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:49.358809 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.361637 systemd[1]: Listening on docker.socket. Jul 2 07:57:49.370731 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:57:49.370936 systemd[1]: Reached target sockets.target. Jul 2 07:57:49.379355 systemd[1]: Reached target basic.target. Jul 2 07:57:49.386339 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.386520 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:57:49.388405 systemd[1]: Starting containerd.service... Jul 2 07:57:49.397161 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:57:49.407568 systemd[1]: Starting dbus.service... Jul 2 07:57:49.416653 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:57:49.424860 systemd[1]: Starting extend-filesystems.service... Jul 2 07:57:49.429893 jq[1187]: false Jul 2 07:57:49.432237 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:57:49.434459 systemd[1]: Starting modprobe@drm.service... Jul 2 07:57:49.443668 systemd[1]: Starting motdgen.service... Jul 2 07:57:49.452190 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:57:49.461132 systemd[1]: Starting sshd-keygen.service... Jul 2 07:57:49.470166 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:57:49.478220 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:57:49.478476 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Jul 2 07:57:49.479274 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:57:49.480720 systemd[1]: Starting update-engine.service... Jul 2 07:57:49.490267 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:57:49.496015 jq[1208]: true Jul 2 07:57:49.503798 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:57:49.506171 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:57:49.507033 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:57:49.507263 systemd[1]: Finished modprobe@drm.service. Jul 2 07:57:49.515947 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:57:49.516235 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:57:49.521873 extend-filesystems[1188]: Found loop1 Jul 2 07:57:49.521873 extend-filesystems[1188]: Found sda Jul 2 07:57:49.521873 extend-filesystems[1188]: Found sda1 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda2 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda3 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found usr Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda4 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda6 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda7 Jul 2 07:57:49.570267 extend-filesystems[1188]: Found sda9 Jul 2 07:57:49.570267 extend-filesystems[1188]: Checking size of /dev/sda9 Jul 2 07:57:49.570267 extend-filesystems[1188]: Resized partition /dev/sda9 Jul 2 07:57:49.791272 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Jul 2 07:57:49.791335 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Jul 2 07:57:49.525114 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:57:49.543397 dbus-daemon[1186]: [system] SELinux support is enabled Jul 2 07:57:49.792050 update_engine[1205]: I0702 07:57:49.653503 1205 main.cc:92] Flatcar Update Engine starting Jul 2 07:57:49.792050 update_engine[1205]: I0702 07:57:49.659312 1205 update_check_scheduler.cc:74] Next update check in 9m58s Jul 2 07:57:49.792437 extend-filesystems[1215]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:57:49.792437 extend-filesystems[1215]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 07:57:49.792437 extend-filesystems[1215]: old_desc_blocks = 1, new_desc_blocks = 2 Jul 2 07:57:49.792437 extend-filesystems[1215]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Jul 2 07:57:49.530155 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:57:49.842174 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:57:49.842279 jq[1216]: true Jul 2 07:57:49.561064 dbus-daemon[1186]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1023 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:57:49.842660 extend-filesystems[1188]: Resized filesystem in /dev/sda9 Jul 2 07:57:49.530385 systemd[1]: Finished motdgen.service. Jul 2 07:57:49.852513 env[1217]: time="2024-07-02T07:57:49.847582541Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:57:49.572121 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:57:49.551680 systemd[1]: Started dbus.service. Jul 2 07:57:49.571693 systemd[1]: Finished ensure-sysext.service. Jul 2 07:57:49.853611 bash[1244]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:57:49.616615 systemd[1]: Reached target network-online.target. Jul 2 07:57:49.632657 systemd[1]: Starting kubelet.service... Jul 2 07:57:49.653135 systemd[1]: Starting oem-gce.service... Jul 2 07:57:49.661288 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:57:49.661362 systemd[1]: Reached target system-config.target. Jul 2 07:57:49.673942 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:57:49.855275 mkfs.ext4[1247]: mke2fs 1.46.5 (30-Dec-2021) Jul 2 07:57:49.855275 mkfs.ext4[1247]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Jul 2 07:57:49.855275 mkfs.ext4[1247]: Creating filesystem with 262144 4k blocks and 65536 inodes Jul 2 07:57:49.855275 mkfs.ext4[1247]: Filesystem UUID: a8003381-68af-42ae-bf40-1b2014a171d5 Jul 2 07:57:49.855275 mkfs.ext4[1247]: Superblock backups stored on blocks: Jul 2 07:57:49.855275 mkfs.ext4[1247]: 32768, 98304, 163840, 229376 Jul 2 07:57:49.855275 mkfs.ext4[1247]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:57:49.855275 mkfs.ext4[1247]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:57:49.855275 mkfs.ext4[1247]: Creating journal (8192 blocks): done Jul 2 07:57:49.855275 mkfs.ext4[1247]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:57:49.685309 systemd[1]: Starting systemd-logind.service... Jul 2 07:57:49.692312 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:57:49.692398 systemd[1]: Reached target user-config.target. Jul 2 07:57:49.856691 umount[1251]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Jul 2 07:57:49.701933 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:57:49.702191 systemd[1]: Finished extend-filesystems.service. Jul 2 07:57:49.715752 systemd[1]: Started update-engine.service. Jul 2 07:57:49.729600 systemd[1]: Started locksmithd.service. Jul 2 07:57:49.736112 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:57:49.923141 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:57:49.958157 coreos-metadata[1185]: Jul 02 07:57:49.957 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Jul 2 07:57:49.967745 coreos-metadata[1185]: Jul 02 07:57:49.967 INFO Fetch failed with 404: resource not found Jul 2 07:57:49.968006 coreos-metadata[1185]: Jul 02 07:57:49.967 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Jul 2 07:57:49.970468 coreos-metadata[1185]: Jul 02 07:57:49.970 INFO Fetch successful Jul 2 07:57:49.970809 coreos-metadata[1185]: Jul 02 07:57:49.970 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Jul 2 07:57:49.973485 coreos-metadata[1185]: Jul 02 07:57:49.972 INFO Fetch failed with 404: resource not found Jul 2 07:57:49.973792 coreos-metadata[1185]: Jul 02 07:57:49.973 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Jul 2 07:57:49.975492 coreos-metadata[1185]: Jul 02 07:57:49.975 INFO Fetch failed with 404: resource not found Jul 2 07:57:49.975693 coreos-metadata[1185]: Jul 02 07:57:49.975 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Jul 2 07:57:49.976904 coreos-metadata[1185]: Jul 02 07:57:49.976 INFO Fetch successful Jul 2 07:57:49.981483 unknown[1185]: wrote ssh authorized keys file for user: core Jul 2 07:57:50.020458 update-ssh-keys[1259]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:57:50.020984 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:57:50.036317 systemd-logind[1243]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:57:50.036731 systemd-logind[1243]: Watching system buttons on /dev/input/event3 (Sleep Button) Jul 2 07:57:50.036852 systemd-logind[1243]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:57:50.038225 systemd-logind[1243]: New seat seat0. Jul 2 07:57:50.053074 systemd[1]: Started systemd-logind.service. Jul 2 07:57:50.074918 env[1217]: time="2024-07-02T07:57:50.074861808Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:57:50.077554 env[1217]: time="2024-07-02T07:57:50.077517261Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.079920 env[1217]: time="2024-07-02T07:57:50.079875921Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:57:50.082167 env[1217]: time="2024-07-02T07:57:50.082133067Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.082626 env[1217]: time="2024-07-02T07:57:50.082596051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:57:50.085162 env[1217]: time="2024-07-02T07:57:50.085130087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.085297 env[1217]: time="2024-07-02T07:57:50.085273955Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:57:50.085393 env[1217]: time="2024-07-02T07:57:50.085375298Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.085583 env[1217]: time="2024-07-02T07:57:50.085564630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.086195 env[1217]: time="2024-07-02T07:57:50.086167466Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:57:50.089984 env[1217]: time="2024-07-02T07:57:50.089948869Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:57:50.090135 env[1217]: time="2024-07-02T07:57:50.090104051Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:57:50.090312 env[1217]: time="2024-07-02T07:57:50.090290610Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:57:50.090413 env[1217]: time="2024-07-02T07:57:50.090395726Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:57:50.102740 env[1217]: time="2024-07-02T07:57:50.102703518Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:57:50.102925 env[1217]: time="2024-07-02T07:57:50.102898295Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:57:50.103041 env[1217]: time="2024-07-02T07:57:50.103022932Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:57:50.103277 env[1217]: time="2024-07-02T07:57:50.103203807Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103400 env[1217]: time="2024-07-02T07:57:50.103381935Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103512 env[1217]: time="2024-07-02T07:57:50.103494337Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103623 env[1217]: time="2024-07-02T07:57:50.103605421Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103745 env[1217]: time="2024-07-02T07:57:50.103727380Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103862 env[1217]: time="2024-07-02T07:57:50.103845139Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.103980 env[1217]: time="2024-07-02T07:57:50.103961395Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.104121 env[1217]: time="2024-07-02T07:57:50.104079841Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.104236 env[1217]: time="2024-07-02T07:57:50.104218045Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:57:50.104495 env[1217]: time="2024-07-02T07:57:50.104477046Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:57:50.104718 env[1217]: time="2024-07-02T07:57:50.104700370Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:57:50.105347 env[1217]: time="2024-07-02T07:57:50.105323067Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:57:50.105488 env[1217]: time="2024-07-02T07:57:50.105469428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.105597 env[1217]: time="2024-07-02T07:57:50.105579051Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:57:50.105766 env[1217]: time="2024-07-02T07:57:50.105748133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.105965 env[1217]: time="2024-07-02T07:57:50.105945360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106201 env[1217]: time="2024-07-02T07:57:50.106145644Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106388 env[1217]: time="2024-07-02T07:57:50.106365708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106486 env[1217]: time="2024-07-02T07:57:50.106467536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106576 env[1217]: time="2024-07-02T07:57:50.106558381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106673 env[1217]: time="2024-07-02T07:57:50.106655561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106761 env[1217]: time="2024-07-02T07:57:50.106744065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.106910 env[1217]: time="2024-07-02T07:57:50.106891989Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:57:50.107189 env[1217]: time="2024-07-02T07:57:50.107165737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.107309 env[1217]: time="2024-07-02T07:57:50.107291003Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.107399 env[1217]: time="2024-07-02T07:57:50.107381314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.107491 env[1217]: time="2024-07-02T07:57:50.107473841Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:57:50.107585 env[1217]: time="2024-07-02T07:57:50.107564103Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:57:50.107668 env[1217]: time="2024-07-02T07:57:50.107651305Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:57:50.107776 env[1217]: time="2024-07-02T07:57:50.107750873Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:57:50.107904 env[1217]: time="2024-07-02T07:57:50.107885807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:57:50.110743 env[1217]: time="2024-07-02T07:57:50.110648003Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:57:50.113905 env[1217]: time="2024-07-02T07:57:50.110933701Z" level=info msg="Connect containerd service" Jul 2 07:57:50.113905 env[1217]: time="2024-07-02T07:57:50.110985674Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:57:50.115860 env[1217]: time="2024-07-02T07:57:50.115823517Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:57:50.118449 env[1217]: time="2024-07-02T07:57:50.118422528Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:57:50.118628 env[1217]: time="2024-07-02T07:57:50.118609166Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:57:50.118856 systemd[1]: Started containerd.service. Jul 2 07:57:50.119361 env[1217]: time="2024-07-02T07:57:50.119314543Z" level=info msg="Start subscribing containerd event" Jul 2 07:57:50.119498 env[1217]: time="2024-07-02T07:57:50.119479960Z" level=info msg="Start recovering state" Jul 2 07:57:50.119684 env[1217]: time="2024-07-02T07:57:50.119666872Z" level=info msg="Start event monitor" Jul 2 07:57:50.119793 env[1217]: time="2024-07-02T07:57:50.119776339Z" level=info msg="Start snapshots syncer" Jul 2 07:57:50.119906 env[1217]: time="2024-07-02T07:57:50.119889747Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:57:50.120008 env[1217]: time="2024-07-02T07:57:50.119992322Z" level=info msg="Start streaming server" Jul 2 07:57:50.121606 env[1217]: time="2024-07-02T07:57:50.119237802Z" level=info msg="containerd successfully booted in 0.272687s" Jul 2 07:57:50.128266 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:57:50.128437 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:57:50.129392 dbus-daemon[1186]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1239 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:57:50.140615 systemd[1]: Starting polkit.service... Jul 2 07:57:50.193354 polkitd[1262]: Started polkitd version 121 Jul 2 07:57:50.215986 polkitd[1262]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:57:50.216084 polkitd[1262]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:57:50.218381 polkitd[1262]: Finished loading, compiling and executing 2 rules Jul 2 07:57:50.218952 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:57:50.219203 systemd[1]: Started polkit.service. Jul 2 07:57:50.219760 polkitd[1262]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:57:50.240256 systemd-hostnamed[1239]: Hostname set to <ci-3510-3-5-2eef9c27abc67456bab3.c.flatcar-212911.internal> (transient) Jul 2 07:57:50.243043 systemd-resolved[1156]: System hostname changed to 'ci-3510-3-5-2eef9c27abc67456bab3.c.flatcar-212911.internal'. Jul 2 07:57:50.774064 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:57:50.830188 systemd[1]: Finished sshd-keygen.service. Jul 2 07:57:50.839710 systemd[1]: Starting issuegen.service... Jul 2 07:57:50.851322 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:57:50.851551 systemd[1]: Finished issuegen.service. Jul 2 07:57:50.862452 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:57:50.875421 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:57:50.889798 systemd[1]: Started getty@tty1.service. Jul 2 07:57:50.900451 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:57:50.908627 systemd[1]: Reached target getty.target. Jul 2 07:57:50.996904 locksmithd[1248]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:57:51.373726 systemd[1]: Started kubelet.service. Jul 2 07:57:52.330805 kubelet[1288]: E0702 07:57:52.330743 1288 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:57:52.333622 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:57:52.333855 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:52.334274 systemd[1]: kubelet.service: Consumed 1.356s CPU time. Jul 2 07:57:54.480644 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Jul 2 07:57:56.686265 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:57:56.699359 systemd-nspawn[1295]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Jul 2 07:57:56.699359 systemd-nspawn[1295]: Press ^] three times within 1s to kill container. Jul 2 07:57:56.714115 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:57:56.792374 systemd[1]: Started oem-gce.service. Jul 2 07:57:56.792789 systemd[1]: Reached target multi-user.target. Jul 2 07:57:56.795020 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:57:56.805681 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:57:56.805907 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:57:56.806361 systemd[1]: Startup finished in 1.005s (kernel) + 6.928s (initrd) + 15.075s (userspace) = 23.009s. Jul 2 07:57:56.845820 systemd-nspawn[1295]: + '[' -e /etc/default/instance_configs.cfg.template ']' Jul 2 07:57:56.845820 systemd-nspawn[1295]: + echo -e '[InstanceSetup]\nset_host_keys = false' Jul 2 07:57:56.846069 systemd-nspawn[1295]: + /usr/bin/google_instance_setup Jul 2 07:57:57.394452 instance-setup[1301]: INFO Running google_set_multiqueue. Jul 2 07:57:57.408618 instance-setup[1301]: INFO Set channels for eth0 to 2. Jul 2 07:57:57.412288 instance-setup[1301]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Jul 2 07:57:57.413617 instance-setup[1301]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Jul 2 07:57:57.414172 instance-setup[1301]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Jul 2 07:57:57.415328 instance-setup[1301]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Jul 2 07:57:57.415753 instance-setup[1301]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Jul 2 07:57:57.417182 instance-setup[1301]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Jul 2 07:57:57.417479 instance-setup[1301]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Jul 2 07:57:57.418852 instance-setup[1301]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Jul 2 07:57:57.429983 instance-setup[1301]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Jul 2 07:57:57.430191 instance-setup[1301]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Jul 2 07:57:57.470420 systemd-nspawn[1295]: + /usr/bin/google_metadata_script_runner --script-type startup Jul 2 07:57:57.790382 startup-script[1332]: INFO Starting startup scripts. Jul 2 07:57:57.802862 startup-script[1332]: INFO No startup scripts found in metadata. Jul 2 07:57:57.803016 startup-script[1332]: INFO Finished running startup scripts. Jul 2 07:57:57.835220 systemd-nspawn[1295]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Jul 2 07:57:57.835220 systemd-nspawn[1295]: + daemon_pids=() Jul 2 07:57:57.835220 systemd-nspawn[1295]: + for d in accounts clock_skew network Jul 2 07:57:57.836243 systemd-nspawn[1295]: + daemon_pids+=($!) Jul 2 07:57:57.836388 systemd-nspawn[1295]: + /usr/bin/google_accounts_daemon Jul 2 07:57:57.836564 systemd-nspawn[1295]: + for d in accounts clock_skew network Jul 2 07:57:57.836940 systemd-nspawn[1295]: + daemon_pids+=($!) Jul 2 07:57:57.837121 systemd-nspawn[1295]: + for d in accounts clock_skew network Jul 2 07:57:57.837486 systemd-nspawn[1295]: + daemon_pids+=($!) Jul 2 07:57:57.837659 systemd-nspawn[1295]: + NOTIFY_SOCKET=/run/systemd/notify Jul 2 07:57:57.837891 systemd-nspawn[1295]: + /usr/bin/systemd-notify --ready Jul 2 07:57:57.838807 systemd-nspawn[1295]: + /usr/bin/google_network_daemon Jul 2 07:57:57.839379 systemd-nspawn[1295]: + /usr/bin/google_clock_skew_daemon Jul 2 07:57:57.888875 systemd-nspawn[1295]: + wait -n 36 37 38 Jul 2 07:57:58.465448 google-clock-skew[1336]: INFO Starting Google Clock Skew daemon. Jul 2 07:57:58.467973 groupadd[1345]: group added to /etc/group: name=google-sudoers, GID=1000 Jul 2 07:57:58.471570 groupadd[1345]: group added to /etc/gshadow: name=google-sudoers Jul 2 07:57:58.482377 google-clock-skew[1336]: INFO Clock drift token has changed: 0. Jul 2 07:57:58.487120 systemd-nspawn[1295]: hwclock: Cannot access the Hardware Clock via any known method. Jul 2 07:57:58.487120 systemd-nspawn[1295]: hwclock: Use the --verbose option to see the details of our search for an access method. Jul 2 07:57:58.488040 google-clock-skew[1336]: WARNING Failed to sync system time with hardware clock. Jul 2 07:57:58.495680 groupadd[1345]: new group: name=google-sudoers, GID=1000 Jul 2 07:57:58.511741 google-accounts[1335]: INFO Starting Google Accounts daemon. Jul 2 07:57:58.543843 google-accounts[1335]: WARNING OS Login not installed. Jul 2 07:57:58.544869 google-accounts[1335]: INFO Creating a new user account for 0. Jul 2 07:57:58.552266 systemd-nspawn[1295]: useradd: invalid user name '0': use --badname to ignore Jul 2 07:57:58.553247 google-accounts[1335]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Jul 2 07:57:58.571920 google-networking[1337]: INFO Starting Google Networking daemon. Jul 2 07:57:58.686701 systemd[1]: Created slice system-sshd.slice. Jul 2 07:57:58.689113 systemd[1]: Started sshd@0-10.128.0.13:22-147.75.109.163:57900.service. Jul 2 07:57:58.989598 sshd[1358]: Accepted publickey for core from 147.75.109.163 port 57900 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:57:58.993353 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:59.009298 systemd[1]: Created slice user-500.slice. Jul 2 07:57:59.011317 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:57:59.018202 systemd-logind[1243]: New session 1 of user core. Jul 2 07:57:59.025760 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:57:59.028484 systemd[1]: Starting user@500.service... Jul 2 07:57:59.040980 (systemd)[1361]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:59.138477 systemd[1361]: Queued start job for default target default.target. Jul 2 07:57:59.139265 systemd[1361]: Reached target paths.target. Jul 2 07:57:59.139304 systemd[1361]: Reached target sockets.target. Jul 2 07:57:59.139326 systemd[1361]: Reached target timers.target. Jul 2 07:57:59.139346 systemd[1361]: Reached target basic.target. Jul 2 07:57:59.139419 systemd[1361]: Reached target default.target. Jul 2 07:57:59.139472 systemd[1361]: Startup finished in 90ms. Jul 2 07:57:59.140278 systemd[1]: Started user@500.service. Jul 2 07:57:59.141947 systemd[1]: Started session-1.scope. Jul 2 07:57:59.360445 systemd[1]: Started sshd@1-10.128.0.13:22-147.75.109.163:57908.service. Jul 2 07:57:59.649472 sshd[1370]: Accepted publickey for core from 147.75.109.163 port 57908 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:57:59.651146 sshd[1370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:57:59.658203 systemd[1]: Started session-2.scope. Jul 2 07:57:59.658973 systemd-logind[1243]: New session 2 of user core. Jul 2 07:57:59.861393 sshd[1370]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:59.866538 systemd[1]: sshd@1-10.128.0.13:22-147.75.109.163:57908.service: Deactivated successfully. Jul 2 07:57:59.867614 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:57:59.868470 systemd-logind[1243]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:57:59.869667 systemd-logind[1243]: Removed session 2. Jul 2 07:57:59.906032 systemd[1]: Started sshd@2-10.128.0.13:22-147.75.109.163:57910.service. Jul 2 07:58:00.193653 sshd[1376]: Accepted publickey for core from 147.75.109.163 port 57910 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:00.195738 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:00.202351 systemd-logind[1243]: New session 3 of user core. Jul 2 07:58:00.203187 systemd[1]: Started session-3.scope. Jul 2 07:58:00.399415 sshd[1376]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:00.403685 systemd[1]: sshd@2-10.128.0.13:22-147.75.109.163:57910.service: Deactivated successfully. Jul 2 07:58:00.404899 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:58:00.405807 systemd-logind[1243]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:58:00.407367 systemd-logind[1243]: Removed session 3. Jul 2 07:58:00.444414 systemd[1]: Started sshd@3-10.128.0.13:22-147.75.109.163:57922.service. Jul 2 07:58:00.730634 sshd[1382]: Accepted publickey for core from 147.75.109.163 port 57922 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:00.732530 sshd[1382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:00.737761 systemd-logind[1243]: New session 4 of user core. Jul 2 07:58:00.739272 systemd[1]: Started session-4.scope. Jul 2 07:58:00.940359 sshd[1382]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:00.944355 systemd[1]: sshd@3-10.128.0.13:22-147.75.109.163:57922.service: Deactivated successfully. Jul 2 07:58:00.945448 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:58:00.946387 systemd-logind[1243]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:58:00.947853 systemd-logind[1243]: Removed session 4. Jul 2 07:58:00.985771 systemd[1]: Started sshd@4-10.128.0.13:22-147.75.109.163:57930.service. Jul 2 07:58:01.272934 sshd[1388]: Accepted publickey for core from 147.75.109.163 port 57930 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:01.274857 sshd[1388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:01.280899 systemd-logind[1243]: New session 5 of user core. Jul 2 07:58:01.281603 systemd[1]: Started session-5.scope. Jul 2 07:58:01.464625 sudo[1391]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:58:01.465042 sudo[1391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:01.474314 dbus-daemon[1186]: Ѝ<B\u0006V: received setenforce notice (enforcing=939966800) Jul 2 07:58:01.476578 sudo[1391]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:01.520084 sshd[1388]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:01.524510 systemd[1]: sshd@4-10.128.0.13:22-147.75.109.163:57930.service: Deactivated successfully. Jul 2 07:58:01.525711 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:58:01.526643 systemd-logind[1243]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:58:01.527868 systemd-logind[1243]: Removed session 5. Jul 2 07:58:01.567269 systemd[1]: Started sshd@5-10.128.0.13:22-147.75.109.163:57946.service. Jul 2 07:58:01.861468 sshd[1395]: Accepted publickey for core from 147.75.109.163 port 57946 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:01.863422 sshd[1395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:01.869168 systemd-logind[1243]: New session 6 of user core. Jul 2 07:58:01.870048 systemd[1]: Started session-6.scope. Jul 2 07:58:02.039477 sudo[1399]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:58:02.039904 sudo[1399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:02.043966 sudo[1399]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:02.055638 sudo[1398]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:58:02.056047 sudo[1398]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:02.068139 systemd[1]: Stopping audit-rules.service... Jul 2 07:58:02.070030 auditctl[1402]: No rules Jul 2 07:58:02.068000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:58:02.075797 kernel: kauditd_printk_skb: 208 callbacks suppressed Jul 2 07:58:02.075886 kernel: audit: type=1305 audit(1719907082.068:189): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:58:02.076320 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:58:02.076557 systemd[1]: Stopped audit-rules.service. Jul 2 07:58:02.079020 systemd[1]: Starting audit-rules.service... Jul 2 07:58:02.068000 audit[1402]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbd657720 a2=420 a3=0 items=0 ppid=1 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:02.113561 augenrules[1419]: No rules Jul 2 07:58:02.114755 systemd[1]: Finished audit-rules.service. Jul 2 07:58:02.123324 kernel: audit: type=1300 audit(1719907082.068:189): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbd657720 a2=420 a3=0 items=0 ppid=1 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:02.123000 sudo[1398]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:02.068000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:58:02.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.133122 kernel: audit: type=1327 audit(1719907082.068:189): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:58:02.133180 kernel: audit: type=1131 audit(1719907082.075:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.175880 kernel: audit: type=1130 audit(1719907082.110:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.179777 kernel: audit: type=1106 audit(1719907082.121:192): pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.121000 audit[1398]: USER_END pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.178659 sshd[1395]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:02.183878 systemd[1]: sshd@5-10.128.0.13:22-147.75.109.163:57946.service: Deactivated successfully. Jul 2 07:58:02.184902 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:58:02.186626 systemd-logind[1243]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:58:02.188055 systemd-logind[1243]: Removed session 6. Jul 2 07:58:02.122000 audit[1398]: CRED_DISP pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.223536 kernel: audit: type=1104 audit(1719907082.122:193): pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.229305 kernel: audit: type=1106 audit(1719907082.179:194): pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.179000 audit[1395]: USER_END pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.235327 systemd[1]: Started sshd@6-10.128.0.13:22-147.75.109.163:57962.service. Jul 2 07:58:02.179000 audit[1395]: CRED_DISP pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.279515 kernel: audit: type=1104 audit(1719907082.179:195): pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.279616 kernel: audit: type=1131 audit(1719907082.183:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.13:22-147.75.109.163:57946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.13:22-147.75.109.163:57946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.13:22-147.75.109.163:57962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.485731 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:58:02.486184 systemd[1]: Stopped kubelet.service. Jul 2 07:58:02.486265 systemd[1]: kubelet.service: Consumed 1.356s CPU time. Jul 2 07:58:02.488509 systemd[1]: Starting kubelet.service... Jul 2 07:58:02.547000 audit[1425]: USER_ACCT pid=1425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.549231 sshd[1425]: Accepted publickey for core from 147.75.109.163 port 57962 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:02.549000 audit[1425]: CRED_ACQ pid=1425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.549000 audit[1425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63b2de30 a2=3 a3=0 items=0 ppid=1 pid=1425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:02.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:02.551214 sshd[1425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:02.557904 systemd[1]: Started session-7.scope. Jul 2 07:58:02.558503 systemd-logind[1243]: New session 7 of user core. Jul 2 07:58:02.566000 audit[1425]: USER_START pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.568000 audit[1429]: CRED_ACQ pid=1429 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:02.734747 systemd[1]: Started kubelet.service. Jul 2 07:58:02.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.736000 audit[1430]: USER_ACCT pid=1430 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.737571 sudo[1430]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:58:02.737000 audit[1430]: CRED_REFR pid=1430 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.738577 sudo[1430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:58:02.740000 audit[1430]: USER_START pid=1430 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:02.762703 systemd[1]: Starting coreos-metadata.service... Jul 2 07:58:02.839394 kubelet[1433]: E0702 07:58:02.839336 1433 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:58:02.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:58:02.844072 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:58:02.844279 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:58:02.846079 coreos-metadata[1442]: Jul 02 07:58:02.846 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Jul 2 07:58:02.847626 coreos-metadata[1442]: Jul 02 07:58:02.847 INFO Fetch successful Jul 2 07:58:02.847733 coreos-metadata[1442]: Jul 02 07:58:02.847 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Jul 2 07:58:02.848470 coreos-metadata[1442]: Jul 02 07:58:02.848 INFO Fetch successful Jul 2 07:58:02.848589 coreos-metadata[1442]: Jul 02 07:58:02.848 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Jul 2 07:58:02.849359 coreos-metadata[1442]: Jul 02 07:58:02.849 INFO Fetch successful Jul 2 07:58:02.849482 coreos-metadata[1442]: Jul 02 07:58:02.849 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Jul 2 07:58:02.850212 coreos-metadata[1442]: Jul 02 07:58:02.850 INFO Fetch successful Jul 2 07:58:02.860169 systemd[1]: Finished coreos-metadata.service. Jul 2 07:58:02.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:03.778078 systemd[1]: Stopped kubelet.service. Jul 2 07:58:03.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:03.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:03.782577 systemd[1]: Starting kubelet.service... Jul 2 07:58:03.818891 systemd[1]: Reloading. Jul 2 07:58:03.973280 /usr/lib/systemd/system-generators/torcx-generator[1503]: time="2024-07-02T07:58:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:58:03.973327 /usr/lib/systemd/system-generators/torcx-generator[1503]: time="2024-07-02T07:58:03Z" level=info msg="torcx already run" Jul 2 07:58:04.075702 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:58:04.075734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:58:04.099239 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit: BPF prog-id=46 op=LOAD Jul 2 07:58:04.191000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit: BPF prog-id=47 op=LOAD Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.191000 audit: BPF prog-id=48 op=LOAD Jul 2 07:58:04.191000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:58:04.191000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit: BPF prog-id=49 op=LOAD Jul 2 07:58:04.194000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit: BPF prog-id=50 op=LOAD Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.194000 audit: BPF prog-id=51 op=LOAD Jul 2 07:58:04.194000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:58:04.194000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.195000 audit: BPF prog-id=52 op=LOAD Jul 2 07:58:04.195000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit: BPF prog-id=53 op=LOAD Jul 2 07:58:04.220000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit: BPF prog-id=54 op=LOAD Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.220000 audit: BPF prog-id=55 op=LOAD Jul 2 07:58:04.220000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:58:04.220000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit: BPF prog-id=56 op=LOAD Jul 2 07:58:04.222000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit: BPF prog-id=57 op=LOAD Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.222000 audit: BPF prog-id=58 op=LOAD Jul 2 07:58:04.222000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:58:04.222000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.224000 audit: BPF prog-id=59 op=LOAD Jul 2 07:58:04.224000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.226000 audit: BPF prog-id=60 op=LOAD Jul 2 07:58:04.226000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit: BPF prog-id=61 op=LOAD Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.228000 audit: BPF prog-id=62 op=LOAD Jul 2 07:58:04.228000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:58:04.228000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.229000 audit: BPF prog-id=63 op=LOAD Jul 2 07:58:04.229000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:58:04.256372 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:58:04.256619 systemd[1]: Stopped kubelet.service. Jul 2 07:58:04.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:04.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:04.258778 systemd[1]: Starting kubelet.service... Jul 2 07:58:04.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:04.453359 systemd[1]: Started kubelet.service. Jul 2 07:58:04.511718 kubelet[1550]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:58:04.511718 kubelet[1550]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:58:04.511718 kubelet[1550]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:58:04.512315 kubelet[1550]: I0702 07:58:04.511790 1550 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:58:04.874962 kubelet[1550]: I0702 07:58:04.874916 1550 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:58:04.874962 kubelet[1550]: I0702 07:58:04.874955 1550 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:58:04.875844 kubelet[1550]: I0702 07:58:04.875813 1550 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:58:04.907111 kubelet[1550]: I0702 07:58:04.907053 1550 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:58:04.923980 kubelet[1550]: I0702 07:58:04.923940 1550 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:58:04.927747 kubelet[1550]: I0702 07:58:04.927670 1550 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:58:04.928028 kubelet[1550]: I0702 07:58:04.927726 1550 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.13","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:58:04.928256 kubelet[1550]: I0702 07:58:04.928035 1550 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:58:04.928256 kubelet[1550]: I0702 07:58:04.928055 1550 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:58:04.928256 kubelet[1550]: I0702 07:58:04.928255 1550 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:58:04.929603 kubelet[1550]: I0702 07:58:04.929568 1550 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:58:04.929603 kubelet[1550]: I0702 07:58:04.929599 1550 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:58:04.929770 kubelet[1550]: I0702 07:58:04.929633 1550 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:58:04.929770 kubelet[1550]: I0702 07:58:04.929652 1550 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:58:04.930257 kubelet[1550]: E0702 07:58:04.930217 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:04.930393 kubelet[1550]: E0702 07:58:04.930265 1550 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:04.935783 kubelet[1550]: I0702 07:58:04.935757 1550 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:58:04.937948 kubelet[1550]: I0702 07:58:04.937914 1550 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:58:04.938215 kubelet[1550]: W0702 07:58:04.938195 1550 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:58:04.939114 kubelet[1550]: I0702 07:58:04.939078 1550 server.go:1264] "Started kubelet" Jul 2 07:58:04.939000 audit[1550]: AVC avc: denied { mac_admin } for pid=1550 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.939000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:04.939000 audit[1550]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009da3c0 a1=c000c23b18 a2=c0009da390 a3=25 items=0 ppid=1 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:04.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:04.941166 kubelet[1550]: I0702 07:58:04.941137 1550 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:58:04.940000 audit[1550]: AVC avc: denied { mac_admin } for pid=1550 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:04.940000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:04.940000 audit[1550]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000beec0 a1=c000c23b30 a2=c0009da450 a3=25 items=0 ppid=1 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:04.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:04.941570 kubelet[1550]: I0702 07:58:04.941528 1550 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:58:04.941687 kubelet[1550]: I0702 07:58:04.941654 1550 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:58:04.950330 kubelet[1550]: W0702 07:58:04.950284 1550 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.128.0.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:58:04.950330 kubelet[1550]: E0702 07:58:04.950324 1550 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:58:04.950506 kubelet[1550]: W0702 07:58:04.950443 1550 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:58:04.950506 kubelet[1550]: E0702 07:58:04.950466 1550 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:58:04.954471 kubelet[1550]: E0702 07:58:04.954322 1550 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.13.17de56619c782201 default 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.13,UID:10.128.0.13,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.13,},FirstTimestamp:2024-07-02 07:58:04.939043329 +0000 UTC m=+0.479600844,LastTimestamp:2024-07-02 07:58:04.939043329 +0000 UTC m=+0.479600844,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.13,}" Jul 2 07:58:04.955990 kubelet[1550]: E0702 07:58:04.955967 1550 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:58:04.959299 kubelet[1550]: I0702 07:58:04.959258 1550 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:58:04.960732 kubelet[1550]: I0702 07:58:04.960701 1550 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:58:04.962145 kubelet[1550]: I0702 07:58:04.962055 1550 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:58:04.962451 kubelet[1550]: I0702 07:58:04.962410 1550 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:58:04.965039 kubelet[1550]: I0702 07:58:04.965010 1550 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:58:04.965591 kubelet[1550]: I0702 07:58:04.965548 1550 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:58:04.965699 kubelet[1550]: I0702 07:58:04.965622 1550 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:58:04.966452 kubelet[1550]: I0702 07:58:04.966411 1550 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:58:04.966542 kubelet[1550]: I0702 07:58:04.966523 1550 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:58:04.969202 kubelet[1550]: I0702 07:58:04.969158 1550 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:58:05.007074 kubelet[1550]: E0702 07:58:05.007008 1550 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.13\" not found" node="10.128.0.13" Jul 2 07:58:05.009860 kubelet[1550]: I0702 07:58:05.009617 1550 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:58:05.009860 kubelet[1550]: I0702 07:58:05.009641 1550 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:58:05.010037 kubelet[1550]: I0702 07:58:05.009900 1550 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:58:05.013000 audit[1562]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.013000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd0c3dd80 a2=0 a3=7fffd0c3dd6c items=0 ppid=1550 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:58:05.014605 kubelet[1550]: I0702 07:58:05.014482 1550 policy_none.go:49] "None policy: Start" Jul 2 07:58:05.015582 kubelet[1550]: I0702 07:58:05.015563 1550 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:58:05.015744 kubelet[1550]: I0702 07:58:05.015725 1550 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:58:05.015000 audit[1568]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.015000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd06586c90 a2=0 a3=7ffd06586c7c items=0 ppid=1550 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:58:05.023210 systemd[1]: Created slice kubepods.slice. Jul 2 07:58:05.029768 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:58:05.034592 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:58:05.040426 kubelet[1550]: I0702 07:58:05.040397 1550 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:58:05.040568 kubelet[1550]: I0702 07:58:05.040482 1550 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:58:05.039000 audit[1550]: AVC avc: denied { mac_admin } for pid=1550 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:05.039000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:58:05.039000 audit[1550]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000057a40 a1=c000cc8af8 a2=c0000579e0 a3=25 items=0 ppid=1 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:58:05.044475 kubelet[1550]: I0702 07:58:05.040636 1550 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:58:05.044475 kubelet[1550]: I0702 07:58:05.040991 1550 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:58:05.044475 kubelet[1550]: E0702 07:58:05.043422 1550 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.13\" not found" Jul 2 07:58:05.025000 audit[1570]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.025000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb632ad80 a2=0 a3=7fffb632ad6c items=0 ppid=1550 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:05.052000 audit[1575]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.052000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff82ae6f0 a2=0 a3=7ffff82ae6dc items=0 ppid=1550 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:05.067076 kubelet[1550]: I0702 07:58:05.066992 1550 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.13" Jul 2 07:58:05.072418 kubelet[1550]: I0702 07:58:05.072378 1550 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.13" Jul 2 07:58:05.085989 kubelet[1550]: E0702 07:58:05.085940 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.109000 audit[1580]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.109000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc8466a950 a2=0 a3=7ffc8466a93c items=0 ppid=1550 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:58:05.111366 kubelet[1550]: I0702 07:58:05.111299 1550 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:58:05.111000 audit[1581]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:05.111000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc5056ec0 a2=0 a3=7ffcc5056eac items=0 ppid=1550 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:58:05.113376 kubelet[1550]: I0702 07:58:05.113277 1550 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:58:05.113376 kubelet[1550]: I0702 07:58:05.113319 1550 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:58:05.113376 kubelet[1550]: I0702 07:58:05.113347 1550 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:58:05.113524 kubelet[1550]: E0702 07:58:05.113416 1550 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 07:58:05.113000 audit[1582]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.113000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff59c5d2a0 a2=0 a3=7fff59c5d28c items=0 ppid=1550 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:58:05.115000 audit[1583]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1583 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:05.115000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0cf0f250 a2=0 a3=7fff0cf0f23c items=0 ppid=1550 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:58:05.117000 audit[1585]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:05.117000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcafc278f0 a2=0 a3=7ffcafc278dc items=0 ppid=1550 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.117000 audit[1584]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.117000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd21cfd470 a2=0 a3=7ffd21cfd45c items=0 ppid=1550 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:58:05.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:58:05.119000 audit[1586]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:05.119000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffaabd7350 a2=0 a3=7fffaabd733c items=0 ppid=1550 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:58:05.120000 audit[1587]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1587 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:05.120000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe974c5300 a2=0 a3=7ffe974c52ec items=0 ppid=1550 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:58:05.187455 kubelet[1550]: E0702 07:58:05.187306 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.288040 kubelet[1550]: E0702 07:58:05.287978 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.388550 kubelet[1550]: E0702 07:58:05.388489 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.474000 audit[1430]: USER_END pid=1430 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.474000 audit[1430]: CRED_DISP pid=1430 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.475527 sudo[1430]: pam_unix(sudo:session): session closed for user root Jul 2 07:58:05.489213 kubelet[1550]: E0702 07:58:05.489159 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.518945 sshd[1425]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:05.520000 audit[1425]: USER_END pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:05.520000 audit[1425]: CRED_DISP pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:05.523289 systemd[1]: sshd@6-10.128.0.13:22-147.75.109.163:57962.service: Deactivated successfully. Jul 2 07:58:05.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.13:22-147.75.109.163:57962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.524379 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:58:05.525251 systemd-logind[1243]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:58:05.526481 systemd-logind[1243]: Removed session 7. Jul 2 07:58:05.589764 kubelet[1550]: E0702 07:58:05.589703 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.690212 kubelet[1550]: E0702 07:58:05.690157 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.790870 kubelet[1550]: E0702 07:58:05.790732 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.881365 kubelet[1550]: I0702 07:58:05.881299 1550 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 07:58:05.881653 kubelet[1550]: W0702 07:58:05.881522 1550 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 2 07:58:05.881653 kubelet[1550]: W0702 07:58:05.881566 1550 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 2 07:58:05.891511 kubelet[1550]: E0702 07:58:05.891463 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:05.930838 kubelet[1550]: E0702 07:58:05.930772 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:05.992514 kubelet[1550]: E0702 07:58:05.992478 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.093303 kubelet[1550]: E0702 07:58:06.093257 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.194406 kubelet[1550]: E0702 07:58:06.194343 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.294954 kubelet[1550]: E0702 07:58:06.294893 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.395508 kubelet[1550]: E0702 07:58:06.395373 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.496286 kubelet[1550]: E0702 07:58:06.496225 1550 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.13\" not found" Jul 2 07:58:06.598284 kubelet[1550]: I0702 07:58:06.598250 1550 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 07:58:06.598858 env[1217]: time="2024-07-02T07:58:06.598721481Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:58:06.599318 kubelet[1550]: I0702 07:58:06.599080 1550 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 07:58:06.931629 kubelet[1550]: E0702 07:58:06.931572 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:06.931629 kubelet[1550]: I0702 07:58:06.931594 1550 apiserver.go:52] "Watching apiserver" Jul 2 07:58:06.938003 kubelet[1550]: I0702 07:58:06.937949 1550 topology_manager.go:215] "Topology Admit Handler" podUID="cf3e2f83-3548-4a03-9113-3d3c737b7548" podNamespace="kube-system" podName="kube-proxy-2rkbj" Jul 2 07:58:06.938171 kubelet[1550]: I0702 07:58:06.938068 1550 topology_manager.go:215] "Topology Admit Handler" podUID="98c34ec6-f8f2-44ec-b1d5-c49cc3371a09" podNamespace="calico-system" podName="calico-node-2z5bb" Jul 2 07:58:06.938245 kubelet[1550]: I0702 07:58:06.938211 1550 topology_manager.go:215] "Topology Admit Handler" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" podNamespace="calico-system" podName="csi-node-driver-zkzp9" Jul 2 07:58:06.938455 kubelet[1550]: E0702 07:58:06.938421 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:06.946064 systemd[1]: Created slice kubepods-besteffort-pod98c34ec6_f8f2_44ec_b1d5_c49cc3371a09.slice. Jul 2 07:58:06.960173 systemd[1]: Created slice kubepods-besteffort-podcf3e2f83_3548_4a03_9113_3d3c737b7548.slice. Jul 2 07:58:06.966116 kubelet[1550]: I0702 07:58:06.966066 1550 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:58:06.977322 kubelet[1550]: I0702 07:58:06.977287 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/76ac96d4-c8f8-431e-ba50-ef7161db58b4-varrun\") pod \"csi-node-driver-zkzp9\" (UID: \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\") " pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:06.977584 kubelet[1550]: I0702 07:58:06.977557 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/76ac96d4-c8f8-431e-ba50-ef7161db58b4-kubelet-dir\") pod \"csi-node-driver-zkzp9\" (UID: \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\") " pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:06.977701 kubelet[1550]: I0702 07:58:06.977596 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ddst7\" (UniqueName: \"kubernetes.io/projected/76ac96d4-c8f8-431e-ba50-ef7161db58b4-kube-api-access-ddst7\") pod \"csi-node-driver-zkzp9\" (UID: \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\") " pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:06.977701 kubelet[1550]: I0702 07:58:06.977660 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cf3e2f83-3548-4a03-9113-3d3c737b7548-kube-proxy\") pod \"kube-proxy-2rkbj\" (UID: \"cf3e2f83-3548-4a03-9113-3d3c737b7548\") " pod="kube-system/kube-proxy-2rkbj" Jul 2 07:58:06.977812 kubelet[1550]: I0702 07:58:06.977700 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-policysync\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.977812 kubelet[1550]: I0702 07:58:06.977727 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-node-certs\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.977812 kubelet[1550]: I0702 07:58:06.977756 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-var-lib-calico\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.977812 kubelet[1550]: I0702 07:58:06.977795 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-cni-bin-dir\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.978018 kubelet[1550]: I0702 07:58:06.977822 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65qtf\" (UniqueName: \"kubernetes.io/projected/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-kube-api-access-65qtf\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.978018 kubelet[1550]: I0702 07:58:06.977850 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/76ac96d4-c8f8-431e-ba50-ef7161db58b4-socket-dir\") pod \"csi-node-driver-zkzp9\" (UID: \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\") " pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:06.978018 kubelet[1550]: I0702 07:58:06.977875 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/76ac96d4-c8f8-431e-ba50-ef7161db58b4-registration-dir\") pod \"csi-node-driver-zkzp9\" (UID: \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\") " pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:06.978553 kubelet[1550]: I0702 07:58:06.978520 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf3e2f83-3548-4a03-9113-3d3c737b7548-xtables-lock\") pod \"kube-proxy-2rkbj\" (UID: \"cf3e2f83-3548-4a03-9113-3d3c737b7548\") " pod="kube-system/kube-proxy-2rkbj" Jul 2 07:58:06.984241 kubelet[1550]: I0702 07:58:06.984214 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf3e2f83-3548-4a03-9113-3d3c737b7548-lib-modules\") pod \"kube-proxy-2rkbj\" (UID: \"cf3e2f83-3548-4a03-9113-3d3c737b7548\") " pod="kube-system/kube-proxy-2rkbj" Jul 2 07:58:06.984413 kubelet[1550]: I0702 07:58:06.984392 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-cni-net-dir\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.984554 kubelet[1550]: I0702 07:58:06.984532 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-flexvol-driver-host\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.984694 kubelet[1550]: I0702 07:58:06.984674 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-lib-modules\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.984863 kubelet[1550]: I0702 07:58:06.984842 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-var-run-calico\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.985024 kubelet[1550]: I0702 07:58:06.985003 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-tigera-ca-bundle\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.985219 kubelet[1550]: I0702 07:58:06.985197 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-cni-log-dir\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:06.985374 kubelet[1550]: I0702 07:58:06.985352 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8jlnd\" (UniqueName: \"kubernetes.io/projected/cf3e2f83-3548-4a03-9113-3d3c737b7548-kube-api-access-8jlnd\") pod \"kube-proxy-2rkbj\" (UID: \"cf3e2f83-3548-4a03-9113-3d3c737b7548\") " pod="kube-system/kube-proxy-2rkbj" Jul 2 07:58:06.985545 kubelet[1550]: I0702 07:58:06.985520 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98c34ec6-f8f2-44ec-b1d5-c49cc3371a09-xtables-lock\") pod \"calico-node-2z5bb\" (UID: \"98c34ec6-f8f2-44ec-b1d5-c49cc3371a09\") " pod="calico-system/calico-node-2z5bb" Jul 2 07:58:07.092348 kubelet[1550]: E0702 07:58:07.092312 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.092546 kubelet[1550]: W0702 07:58:07.092522 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.092691 kubelet[1550]: E0702 07:58:07.092672 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.093117 kubelet[1550]: E0702 07:58:07.093070 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.093265 kubelet[1550]: W0702 07:58:07.093243 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.093403 kubelet[1550]: E0702 07:58:07.093384 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.093788 kubelet[1550]: E0702 07:58:07.093770 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.093926 kubelet[1550]: W0702 07:58:07.093905 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.094032 kubelet[1550]: E0702 07:58:07.094017 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.094415 kubelet[1550]: E0702 07:58:07.094399 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.094539 kubelet[1550]: W0702 07:58:07.094522 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.094643 kubelet[1550]: E0702 07:58:07.094627 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.095053 kubelet[1550]: E0702 07:58:07.095037 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.095196 kubelet[1550]: W0702 07:58:07.095177 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.095302 kubelet[1550]: E0702 07:58:07.095286 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.095641 kubelet[1550]: E0702 07:58:07.095627 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.095754 kubelet[1550]: W0702 07:58:07.095738 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.095857 kubelet[1550]: E0702 07:58:07.095838 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.096283 kubelet[1550]: E0702 07:58:07.096264 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.096400 kubelet[1550]: W0702 07:58:07.096382 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.096509 kubelet[1550]: E0702 07:58:07.096492 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.096870 kubelet[1550]: E0702 07:58:07.096853 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.096997 kubelet[1550]: W0702 07:58:07.096978 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.097133 kubelet[1550]: E0702 07:58:07.097113 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.097508 kubelet[1550]: E0702 07:58:07.097490 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.097618 kubelet[1550]: W0702 07:58:07.097602 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.097722 kubelet[1550]: E0702 07:58:07.097707 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.098080 kubelet[1550]: E0702 07:58:07.098064 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.098232 kubelet[1550]: W0702 07:58:07.098211 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.098350 kubelet[1550]: E0702 07:58:07.098333 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.098715 kubelet[1550]: E0702 07:58:07.098697 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.098833 kubelet[1550]: W0702 07:58:07.098816 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.098936 kubelet[1550]: E0702 07:58:07.098921 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.099326 kubelet[1550]: E0702 07:58:07.099310 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.099493 kubelet[1550]: W0702 07:58:07.099476 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.099596 kubelet[1550]: E0702 07:58:07.099580 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.099980 kubelet[1550]: E0702 07:58:07.099966 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.100106 kubelet[1550]: W0702 07:58:07.100067 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.100220 kubelet[1550]: E0702 07:58:07.100203 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.100632 kubelet[1550]: E0702 07:58:07.100615 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.100762 kubelet[1550]: W0702 07:58:07.100744 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.100872 kubelet[1550]: E0702 07:58:07.100855 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.101482 kubelet[1550]: E0702 07:58:07.101462 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.101620 kubelet[1550]: W0702 07:58:07.101600 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.101732 kubelet[1550]: E0702 07:58:07.101715 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.102709 kubelet[1550]: E0702 07:58:07.102690 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.102830 kubelet[1550]: W0702 07:58:07.102812 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.102950 kubelet[1550]: E0702 07:58:07.102934 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.103386 kubelet[1550]: E0702 07:58:07.103368 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.103502 kubelet[1550]: W0702 07:58:07.103484 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.103609 kubelet[1550]: E0702 07:58:07.103593 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.103964 kubelet[1550]: E0702 07:58:07.103948 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.104146 kubelet[1550]: W0702 07:58:07.104126 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.105360 kubelet[1550]: E0702 07:58:07.105336 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.110002 kubelet[1550]: E0702 07:58:07.109979 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.110170 kubelet[1550]: W0702 07:58:07.110149 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.110290 kubelet[1550]: E0702 07:58:07.110270 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.120757 kubelet[1550]: E0702 07:58:07.120735 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.120911 kubelet[1550]: W0702 07:58:07.120891 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.121048 kubelet[1550]: E0702 07:58:07.121031 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.121498 kubelet[1550]: E0702 07:58:07.121480 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.121627 kubelet[1550]: W0702 07:58:07.121609 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.121742 kubelet[1550]: E0702 07:58:07.121724 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.128207 kubelet[1550]: E0702 07:58:07.128188 1550 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:58:07.128361 kubelet[1550]: W0702 07:58:07.128343 1550 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:58:07.128500 kubelet[1550]: E0702 07:58:07.128483 1550 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:58:07.259082 env[1217]: time="2024-07-02T07:58:07.258077606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2z5bb,Uid:98c34ec6-f8f2-44ec-b1d5-c49cc3371a09,Namespace:calico-system,Attempt:0,}" Jul 2 07:58:07.264836 env[1217]: time="2024-07-02T07:58:07.264770517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2rkbj,Uid:cf3e2f83-3548-4a03-9113-3d3c737b7548,Namespace:kube-system,Attempt:0,}" Jul 2 07:58:07.778421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2140037798.mount: Deactivated successfully. Jul 2 07:58:07.788377 env[1217]: time="2024-07-02T07:58:07.788314626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.789534 env[1217]: time="2024-07-02T07:58:07.789494773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.793118 env[1217]: time="2024-07-02T07:58:07.793019790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.794271 env[1217]: time="2024-07-02T07:58:07.794218107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.795127 env[1217]: time="2024-07-02T07:58:07.795071623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.797810 env[1217]: time="2024-07-02T07:58:07.797767036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.803823 env[1217]: time="2024-07-02T07:58:07.803749296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.806027 env[1217]: time="2024-07-02T07:58:07.805976880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:07.829595 env[1217]: time="2024-07-02T07:58:07.829511437Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:07.829774 env[1217]: time="2024-07-02T07:58:07.829564356Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:07.829774 env[1217]: time="2024-07-02T07:58:07.829581645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:07.830080 env[1217]: time="2024-07-02T07:58:07.830023458Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de84d682a50da91073a06221e0fb34f38e2d74375a170c375822432bc741748d pid=1623 runtime=io.containerd.runc.v2 Jul 2 07:58:07.837388 env[1217]: time="2024-07-02T07:58:07.837313457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:07.837388 env[1217]: time="2024-07-02T07:58:07.837360792Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:07.837622 env[1217]: time="2024-07-02T07:58:07.837577983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:07.837935 env[1217]: time="2024-07-02T07:58:07.837884190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947 pid=1640 runtime=io.containerd.runc.v2 Jul 2 07:58:07.862804 systemd[1]: Started cri-containerd-a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947.scope. Jul 2 07:58:07.883955 systemd[1]: Started cri-containerd-de84d682a50da91073a06221e0fb34f38e2d74375a170c375822432bc741748d.scope. Jul 2 07:58:07.901519 kernel: kauditd_printk_skb: 280 callbacks suppressed Jul 2 07:58:07.901637 kernel: audit: type=1400 audit(1719907087.894:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.957143 kernel: audit: type=1400 audit(1719907087.894:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.957256 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:07.957315 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:58:07.957347 kubelet[1550]: E0702 07:58:07.945467 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:07.982424 kernel: audit: backlog limit exceeded Jul 2 07:58:07.982571 kernel: audit: type=1400 audit(1719907087.894:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.982616 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.991713 env[1217]: time="2024-07-02T07:58:07.991665351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2z5bb,Uid:98c34ec6-f8f2-44ec-b1d5-c49cc3371a09,Namespace:calico-system,Attempt:0,} returns sandbox id \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\"" Jul 2 07:58:07.995232 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:58:07.995357 kernel: audit: backlog limit exceeded Jul 2 07:58:07.995655 env[1217]: time="2024-07-02T07:58:07.995621861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:58:08.020299 kernel: audit: type=1400 audit(1719907087.894:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.900000 audit: BPF prog-id=64 op=LOAD Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1640 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653964663463373861306333643834323536333666663766306466 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1640 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653964663463373861306333643834323536333666663766306466 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.901000 audit: BPF prog-id=65 op=LOAD Jul 2 07:58:07.901000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000245b60 items=0 ppid=1640 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653964663463373861306333643834323536333666663766306466 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.920000 audit: BPF prog-id=66 op=LOAD Jul 2 07:58:07.920000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000245ba8 items=0 ppid=1640 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653964663463373861306333643834323536333666663766306466 Jul 2 07:58:07.920000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:58:07.921000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.921000 audit: BPF prog-id=67 op=LOAD Jul 2 07:58:07.921000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000245fb8 items=0 ppid=1640 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653964663463373861306333643834323536333666663766306466 Jul 2 07:58:07.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.021000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.021000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1623 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383464363832613530646139313037336130363232316530666233 Jul 2 07:58:08.021000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.021000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1623 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383464363832613530646139313037336130363232316530666233 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit: BPF prog-id=69 op=LOAD Jul 2 07:58:08.022000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00027cd60 items=0 ppid=1623 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383464363832613530646139313037336130363232316530666233 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit: BPF prog-id=70 op=LOAD Jul 2 07:58:08.022000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00027cda8 items=0 ppid=1623 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383464363832613530646139313037336130363232316530666233 Jul 2 07:58:08.022000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:58:08.022000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.022000 audit: BPF prog-id=71 op=LOAD Jul 2 07:58:08.022000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00027d1b8 items=0 ppid=1623 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383464363832613530646139313037336130363232316530666233 Jul 2 07:58:08.044831 env[1217]: time="2024-07-02T07:58:08.039632367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2rkbj,Uid:cf3e2f83-3548-4a03-9113-3d3c737b7548,Namespace:kube-system,Attempt:0,} returns sandbox id \"de84d682a50da91073a06221e0fb34f38e2d74375a170c375822432bc741748d\"" Jul 2 07:58:08.114313 kubelet[1550]: E0702 07:58:08.114250 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:08.914308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3905862008.mount: Deactivated successfully. Jul 2 07:58:08.946595 kubelet[1550]: E0702 07:58:08.946547 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:09.066365 env[1217]: time="2024-07-02T07:58:09.066305084Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.069001 env[1217]: time="2024-07-02T07:58:09.068914326Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.071812 env[1217]: time="2024-07-02T07:58:09.071760077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.074061 env[1217]: time="2024-07-02T07:58:09.074014030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:09.074757 env[1217]: time="2024-07-02T07:58:09.074709147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:58:09.077246 env[1217]: time="2024-07-02T07:58:09.077210217Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 07:58:09.078214 env[1217]: time="2024-07-02T07:58:09.078156986Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:58:09.098342 env[1217]: time="2024-07-02T07:58:09.098284464Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8\"" Jul 2 07:58:09.100176 env[1217]: time="2024-07-02T07:58:09.100139386Z" level=info msg="StartContainer for \"437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8\"" Jul 2 07:58:09.139304 systemd[1]: run-containerd-runc-k8s.io-437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8-runc.GPnkSL.mount: Deactivated successfully. Jul 2 07:58:09.146775 systemd[1]: Started cri-containerd-437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8.scope. Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f931d718cc8 items=0 ppid=1640 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:09.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433376434623630343930346466643730353133333833326561333832 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit: BPF prog-id=72 op=LOAD Jul 2 07:58:09.168000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002851e8 items=0 ppid=1640 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:09.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433376434623630343930346466643730353133333833326561333832 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.168000 audit: BPF prog-id=73 op=LOAD Jul 2 07:58:09.168000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000285238 items=0 ppid=1640 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:09.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433376434623630343930346466643730353133333833326561333832 Jul 2 07:58:09.169000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:58:09.169000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:09.169000 audit: BPF prog-id=74 op=LOAD Jul 2 07:58:09.169000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002852c8 items=0 ppid=1640 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:09.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433376434623630343930346466643730353133333833326561333832 Jul 2 07:58:09.194311 env[1217]: time="2024-07-02T07:58:09.194180366Z" level=info msg="StartContainer for \"437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8\" returns successfully" Jul 2 07:58:09.207763 systemd[1]: cri-containerd-437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8.scope: Deactivated successfully. Jul 2 07:58:09.208000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:58:09.236732 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8-rootfs.mount: Deactivated successfully. Jul 2 07:58:09.288986 env[1217]: time="2024-07-02T07:58:09.288909342Z" level=info msg="shim disconnected" id=437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8 Jul 2 07:58:09.288986 env[1217]: time="2024-07-02T07:58:09.288967407Z" level=warning msg="cleaning up after shim disconnected" id=437d4b604904dfd705133832ea382d86a6d38423895a4c95ec1188d3713715c8 namespace=k8s.io Jul 2 07:58:09.288986 env[1217]: time="2024-07-02T07:58:09.288982978Z" level=info msg="cleaning up dead shim" Jul 2 07:58:09.300399 env[1217]: time="2024-07-02T07:58:09.300345415Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:58:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1746 runtime=io.containerd.runc.v2\n" Jul 2 07:58:09.946907 kubelet[1550]: E0702 07:58:09.946811 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:10.114834 kubelet[1550]: E0702 07:58:10.114363 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:10.243146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount87033532.mount: Deactivated successfully. Jul 2 07:58:10.936555 env[1217]: time="2024-07-02T07:58:10.936510993Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:10.938744 env[1217]: time="2024-07-02T07:58:10.938700599Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:10.940652 env[1217]: time="2024-07-02T07:58:10.940614589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:10.942379 env[1217]: time="2024-07-02T07:58:10.942341547Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:10.943071 env[1217]: time="2024-07-02T07:58:10.943032682Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 07:58:10.944914 env[1217]: time="2024-07-02T07:58:10.944862946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:58:10.945991 env[1217]: time="2024-07-02T07:58:10.945956574Z" level=info msg="CreateContainer within sandbox \"de84d682a50da91073a06221e0fb34f38e2d74375a170c375822432bc741748d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:58:10.947427 kubelet[1550]: E0702 07:58:10.947394 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:10.962458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount848753060.mount: Deactivated successfully. Jul 2 07:58:10.969628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4087498552.mount: Deactivated successfully. Jul 2 07:58:10.977172 env[1217]: time="2024-07-02T07:58:10.977081408Z" level=info msg="CreateContainer within sandbox \"de84d682a50da91073a06221e0fb34f38e2d74375a170c375822432bc741748d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cd546c80eb95da91f2ebe173eadaf1458e704c59358095abeb1d62e2adeca4ff\"" Jul 2 07:58:10.978003 env[1217]: time="2024-07-02T07:58:10.977964521Z" level=info msg="StartContainer for \"cd546c80eb95da91f2ebe173eadaf1458e704c59358095abeb1d62e2adeca4ff\"" Jul 2 07:58:11.001016 systemd[1]: Started cri-containerd-cd546c80eb95da91f2ebe173eadaf1458e704c59358095abeb1d62e2adeca4ff.scope. Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3fd8231b18 items=0 ppid=1623 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353436633830656239356461393166326562653137336561646166 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit: BPF prog-id=75 op=LOAD Jul 2 07:58:11.027000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00030aa48 items=0 ppid=1623 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353436633830656239356461393166326562653137336561646166 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit: BPF prog-id=76 op=LOAD Jul 2 07:58:11.027000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00030aa98 items=0 ppid=1623 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353436633830656239356461393166326562653137336561646166 Jul 2 07:58:11.027000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:58:11.027000 audit: BPF prog-id=75 op=UNLOAD Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.027000 audit: BPF prog-id=77 op=LOAD Jul 2 07:58:11.027000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00030ab28 items=0 ppid=1623 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353436633830656239356461393166326562653137336561646166 Jul 2 07:58:11.048376 env[1217]: time="2024-07-02T07:58:11.048328806Z" level=info msg="StartContainer for \"cd546c80eb95da91f2ebe173eadaf1458e704c59358095abeb1d62e2adeca4ff\" returns successfully" Jul 2 07:58:11.140000 audit[1821]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.140000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbef3fbe0 a2=0 a3=7ffdbef3fbcc items=0 ppid=1780 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:58:11.143000 audit[1822]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.143000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc758ea6e0 a2=0 a3=7ffc758ea6cc items=0 ppid=1780 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:58:11.145000 audit[1823]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.145000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc79b33e10 a2=0 a3=7ffc79b33dfc items=0 ppid=1780 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:58:11.146000 audit[1824]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.146000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd98169860 a2=0 a3=7ffd9816984c items=0 ppid=1780 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:58:11.147000 audit[1825]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.147000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca3d1bd10 a2=0 a3=7ffca3d1bcfc items=0 ppid=1780 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:58:11.149000 audit[1826]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.149000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb8b3b410 a2=0 a3=7ffdb8b3b3fc items=0 ppid=1780 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:58:11.160696 kubelet[1550]: I0702 07:58:11.160630 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2rkbj" podStartSLOduration=3.25986331 podStartE2EDuration="6.160610754s" podCreationTimestamp="2024-07-02 07:58:05 +0000 UTC" firstStartedPulling="2024-07-02 07:58:08.043366565 +0000 UTC m=+3.583924070" lastFinishedPulling="2024-07-02 07:58:10.944114006 +0000 UTC m=+6.484671514" observedRunningTime="2024-07-02 07:58:11.157308676 +0000 UTC m=+6.697866196" watchObservedRunningTime="2024-07-02 07:58:11.160610754 +0000 UTC m=+6.701168253" Jul 2 07:58:11.245000 audit[1827]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.245000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe278cb5e0 a2=0 a3=7ffe278cb5cc items=0 ppid=1780 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:58:11.250000 audit[1829]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.250000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed6d84610 a2=0 a3=7ffed6d845fc items=0 ppid=1780 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:58:11.256000 audit[1832]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.256000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8daf8d30 a2=0 a3=7ffe8daf8d1c items=0 ppid=1780 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:58:11.257000 audit[1833]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.257000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc5940d40 a2=0 a3=7fffc5940d2c items=0 ppid=1780 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:58:11.261000 audit[1835]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.261000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd8dc4840 a2=0 a3=7ffcd8dc482c items=0 ppid=1780 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:58:11.263000 audit[1836]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.263000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1a67e470 a2=0 a3=7ffc1a67e45c items=0 ppid=1780 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:58:11.269000 audit[1838]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.269000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff9433f50 a2=0 a3=7ffff9433f3c items=0 ppid=1780 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:58:11.276000 audit[1841]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.276000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff018a910 a2=0 a3=7ffff018a8fc items=0 ppid=1780 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:58:11.277000 audit[1842]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.277000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeba565df0 a2=0 a3=7ffeba565ddc items=0 ppid=1780 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:58:11.281000 audit[1844]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.281000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb2a02da0 a2=0 a3=7fffb2a02d8c items=0 ppid=1780 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:58:11.282000 audit[1845]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.282000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8a6ead60 a2=0 a3=7ffd8a6ead4c items=0 ppid=1780 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:58:11.286000 audit[1847]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.286000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdeefccaf0 a2=0 a3=7ffdeefccadc items=0 ppid=1780 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:11.292000 audit[1850]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.292000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefd9c11c0 a2=0 a3=7ffefd9c11ac items=0 ppid=1780 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:11.297000 audit[1853]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.297000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc553cbd40 a2=0 a3=7ffc553cbd2c items=0 ppid=1780 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:58:11.299000 audit[1854]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.299000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcba7a0210 a2=0 a3=7ffcba7a01fc items=0 ppid=1780 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:58:11.302000 audit[1856]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.302000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8827e7f0 a2=0 a3=7ffc8827e7dc items=0 ppid=1780 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:11.332000 audit[1861]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.332000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc8611ae10 a2=0 a3=7ffc8611adfc items=0 ppid=1780 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:11.335000 audit[1862]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.335000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc637acc40 a2=0 a3=7ffc637acc2c items=0 ppid=1780 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:58:11.338000 audit[1864]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:58:11.338000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff162f8520 a2=0 a3=7fff162f850c items=0 ppid=1780 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:58:11.366000 audit[1870]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:11.366000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc38089bf0 a2=0 a3=7ffc38089bdc items=0 ppid=1780 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:11.395000 audit[1870]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:11.395000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffc38089bf0 a2=0 a3=7ffc38089bdc items=0 ppid=1780 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:11.414000 audit[1879]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.414000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1a882650 a2=0 a3=7ffc1a88263c items=0 ppid=1780 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:58:11.420000 audit[1881]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.420000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd01ba3bd0 a2=0 a3=7ffd01ba3bbc items=0 ppid=1780 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:58:11.426000 audit[1884]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.426000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc1e9bd350 a2=0 a3=7ffc1e9bd33c items=0 ppid=1780 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:58:11.428000 audit[1885]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.428000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe521e900 a2=0 a3=7fffe521e8ec items=0 ppid=1780 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:58:11.433000 audit[1887]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.433000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd89c60360 a2=0 a3=7ffd89c6034c items=0 ppid=1780 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:58:11.434000 audit[1888]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.434000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff71bece60 a2=0 a3=7fff71bece4c items=0 ppid=1780 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:58:11.438000 audit[1890]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.438000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf2401fa0 a2=0 a3=7ffcf2401f8c items=0 ppid=1780 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:58:11.443000 audit[1893]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.443000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffda5e97fa0 a2=0 a3=7ffda5e97f8c items=0 ppid=1780 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:58:11.445000 audit[1894]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.445000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb9e71400 a2=0 a3=7ffdb9e713ec items=0 ppid=1780 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:58:11.449000 audit[1896]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.449000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc58d9b8b0 a2=0 a3=7ffc58d9b89c items=0 ppid=1780 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:58:11.450000 audit[1897]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.450000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6da0b6f0 a2=0 a3=7ffe6da0b6dc items=0 ppid=1780 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.450000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:58:11.454000 audit[1899]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.454000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc96b66bd0 a2=0 a3=7ffc96b66bbc items=0 ppid=1780 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:58:11.459000 audit[1902]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.459000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7c894660 a2=0 a3=7ffc7c89464c items=0 ppid=1780 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:58:11.464000 audit[1905]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.464000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1ac7cd30 a2=0 a3=7fff1ac7cd1c items=0 ppid=1780 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:58:11.466000 audit[1906]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.466000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc23d6e170 a2=0 a3=7ffc23d6e15c items=0 ppid=1780 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:58:11.469000 audit[1908]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.469000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe32fbce20 a2=0 a3=7ffe32fbce0c items=0 ppid=1780 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:11.476000 audit[1911]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.476000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe84a54900 a2=0 a3=7ffe84a548ec items=0 ppid=1780 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:58:11.477000 audit[1912]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.477000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc07bb5820 a2=0 a3=7ffc07bb580c items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:58:11.482000 audit[1914]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.482000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffddfcc7b80 a2=0 a3=7ffddfcc7b6c items=0 ppid=1780 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:58:11.484000 audit[1915]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.484000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff25bdcf50 a2=0 a3=7fff25bdcf3c items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:58:11.486000 audit[1917]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.486000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcca7b46b0 a2=0 a3=7ffcca7b469c items=0 ppid=1780 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:11.493000 audit[1920]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:58:11.493000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb9262c30 a2=0 a3=7ffdb9262c1c items=0 ppid=1780 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:58:11.498000 audit[1922]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:58:11.498000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff1a3408a0 a2=0 a3=7fff1a34088c items=0 ppid=1780 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.498000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:11.499000 audit[1922]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:58:11.499000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff1a3408a0 a2=0 a3=7fff1a34088c items=0 ppid=1780 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.499000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:11.948185 kubelet[1550]: E0702 07:58:11.948135 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:12.113947 kubelet[1550]: E0702 07:58:12.113883 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:12.265000 audit[1924]: NETFILTER_CFG table=filter:65 family=2 entries=10 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.265000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffefbb3de50 a2=0 a3=7ffefbb3de3c items=0 ppid=1780 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.266000 audit[1924]: NETFILTER_CFG table=nat:66 family=2 entries=20 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.266000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffefbb3de50 a2=0 a3=7ffefbb3de3c items=0 ppid=1780 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.280000 audit[1926]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.280000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc19d5b8f0 a2=0 a3=7ffc19d5b8dc items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.281000 audit[1926]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.281000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc19d5b8f0 a2=0 a3=7ffc19d5b8dc items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.948819 kubelet[1550]: E0702 07:58:12.948701 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:13.949917 kubelet[1550]: E0702 07:58:13.949788 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:14.115150 kubelet[1550]: E0702 07:58:14.114565 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:14.821842 env[1217]: time="2024-07-02T07:58:14.821775840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:14.824216 env[1217]: time="2024-07-02T07:58:14.824171704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:14.826198 env[1217]: time="2024-07-02T07:58:14.826159943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:14.827990 env[1217]: time="2024-07-02T07:58:14.827954763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:14.828648 env[1217]: time="2024-07-02T07:58:14.828594064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:58:14.831926 env[1217]: time="2024-07-02T07:58:14.831871243Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:58:14.847514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount182625036.mount: Deactivated successfully. Jul 2 07:58:14.853921 env[1217]: time="2024-07-02T07:58:14.853873788Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7\"" Jul 2 07:58:14.854682 env[1217]: time="2024-07-02T07:58:14.854647789Z" level=info msg="StartContainer for \"00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7\"" Jul 2 07:58:14.891044 systemd[1]: run-containerd-runc-k8s.io-00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7-runc.SFEdj6.mount: Deactivated successfully. Jul 2 07:58:14.896751 systemd[1]: Started cri-containerd-00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7.scope. Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.924956 kernel: kauditd_printk_skb: 362 callbacks suppressed Jul 2 07:58:14.925077 kernel: audit: type=1400 audit(1719907094.918:543): avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f36b80fd018 items=0 ppid=1640 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.950833 kubelet[1550]: E0702 07:58:14.950779 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:14.978615 kernel: audit: type=1300 audit(1719907094.918:543): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f36b80fd018 items=0 ppid=1640 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.978748 kernel: audit: type=1327 audit(1719907094.918:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030653666633439313763633537303931613735383263353930343838 Jul 2 07:58:14.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030653666633439313763633537303931613735383263353930343838 Jul 2 07:58:15.027472 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.048257 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.069000 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.069085 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.093143 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.096055 env[1217]: time="2024-07-02T07:58:15.096009555Z" level=info msg="StartContainer for \"00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7\" returns successfully" Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.133123 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:15.155185 kernel: audit: type=1400 audit(1719907094.918:544): avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.918000 audit: BPF prog-id=78 op=LOAD Jul 2 07:58:14.918000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003889d8 items=0 ppid=1640 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030653666633439313763633537303931613735383263353930343838 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit: BPF prog-id=79 op=LOAD Jul 2 07:58:14.919000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000388a28 items=0 ppid=1640 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030653666633439313763633537303931613735383263353930343838 Jul 2 07:58:14.919000 audit: BPF prog-id=79 op=UNLOAD Jul 2 07:58:14.919000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:14.919000 audit: BPF prog-id=80 op=LOAD Jul 2 07:58:14.919000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388ab8 items=0 ppid=1640 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030653666633439313763633537303931613735383263353930343838 Jul 2 07:58:15.803206 env[1217]: time="2024-07-02T07:58:15.803032365Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:58:15.806045 systemd[1]: cri-containerd-00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7.scope: Deactivated successfully. Jul 2 07:58:15.808000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:58:15.843320 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7-rootfs.mount: Deactivated successfully. Jul 2 07:58:15.876347 kubelet[1550]: I0702 07:58:15.875898 1550 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:58:15.951584 kubelet[1550]: E0702 07:58:15.951514 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:16.121650 systemd[1]: Created slice kubepods-besteffort-pod76ac96d4_c8f8_431e_ba50_ef7161db58b4.slice. Jul 2 07:58:16.125767 env[1217]: time="2024-07-02T07:58:16.125718195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zkzp9,Uid:76ac96d4-c8f8-431e-ba50-ef7161db58b4,Namespace:calico-system,Attempt:0,}" Jul 2 07:58:16.938941 env[1217]: time="2024-07-02T07:58:16.938875552Z" level=info msg="shim disconnected" id=00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7 Jul 2 07:58:16.938941 env[1217]: time="2024-07-02T07:58:16.938940263Z" level=warning msg="cleaning up after shim disconnected" id=00e6fc4917cc57091a7582c590488c88ae58fddf229fadc3e1209ef3a3c165b7 namespace=k8s.io Jul 2 07:58:16.939306 env[1217]: time="2024-07-02T07:58:16.938954970Z" level=info msg="cleaning up dead shim" Jul 2 07:58:16.952733 kubelet[1550]: E0702 07:58:16.952598 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:16.966575 env[1217]: time="2024-07-02T07:58:16.966520933Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:58:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1974 runtime=io.containerd.runc.v2\n" Jul 2 07:58:17.020233 env[1217]: time="2024-07-02T07:58:17.020148073Z" level=error msg="Failed to destroy network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:17.022560 env[1217]: time="2024-07-02T07:58:17.022493741Z" level=error msg="encountered an error cleaning up failed sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:17.022849 env[1217]: time="2024-07-02T07:58:17.022790570Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zkzp9,Uid:76ac96d4-c8f8-431e-ba50-ef7161db58b4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:17.024255 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87-shm.mount: Deactivated successfully. Jul 2 07:58:17.025816 kubelet[1550]: E0702 07:58:17.025475 1550 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:17.025816 kubelet[1550]: E0702 07:58:17.025562 1550 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:17.025816 kubelet[1550]: E0702 07:58:17.025598 1550 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zkzp9" Jul 2 07:58:17.026088 kubelet[1550]: E0702 07:58:17.025679 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zkzp9_calico-system(76ac96d4-c8f8-431e-ba50-ef7161db58b4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zkzp9_calico-system(76ac96d4-c8f8-431e-ba50-ef7161db58b4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:17.157405 env[1217]: time="2024-07-02T07:58:17.157356135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:58:17.158483 kubelet[1550]: I0702 07:58:17.158452 1550 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:17.159428 env[1217]: time="2024-07-02T07:58:17.159383215Z" level=info msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" Jul 2 07:58:17.192729 env[1217]: time="2024-07-02T07:58:17.192601317Z" level=error msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" failed" error="failed to destroy network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:17.193480 kubelet[1550]: E0702 07:58:17.193173 1550 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:17.193480 kubelet[1550]: E0702 07:58:17.193260 1550 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87"} Jul 2 07:58:17.193480 kubelet[1550]: E0702 07:58:17.193384 1550 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:58:17.193480 kubelet[1550]: E0702 07:58:17.193420 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"76ac96d4-c8f8-431e-ba50-ef7161db58b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zkzp9" podUID="76ac96d4-c8f8-431e-ba50-ef7161db58b4" Jul 2 07:58:17.953591 kubelet[1550]: E0702 07:58:17.953536 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:18.422188 kubelet[1550]: I0702 07:58:18.422065 1550 topology_manager.go:215] "Topology Admit Handler" podUID="96966ba9-5f4e-4230-8a9b-49dc8d84c344" podNamespace="default" podName="nginx-deployment-85f456d6dd-47dq7" Jul 2 07:58:18.431355 systemd[1]: Created slice kubepods-besteffort-pod96966ba9_5f4e_4230_8a9b_49dc8d84c344.slice. Jul 2 07:58:18.567882 kubelet[1550]: I0702 07:58:18.567828 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zf25\" (UniqueName: \"kubernetes.io/projected/96966ba9-5f4e-4230-8a9b-49dc8d84c344-kube-api-access-5zf25\") pod \"nginx-deployment-85f456d6dd-47dq7\" (UID: \"96966ba9-5f4e-4230-8a9b-49dc8d84c344\") " pod="default/nginx-deployment-85f456d6dd-47dq7" Jul 2 07:58:18.737149 env[1217]: time="2024-07-02T07:58:18.736766861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-47dq7,Uid:96966ba9-5f4e-4230-8a9b-49dc8d84c344,Namespace:default,Attempt:0,}" Jul 2 07:58:18.953843 kubelet[1550]: E0702 07:58:18.953787 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:19.005902 env[1217]: time="2024-07-02T07:58:18.997337347Z" level=error msg="Failed to destroy network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:19.005902 env[1217]: time="2024-07-02T07:58:18.997833815Z" level=error msg="encountered an error cleaning up failed sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:19.005902 env[1217]: time="2024-07-02T07:58:18.997911561Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-47dq7,Uid:96966ba9-5f4e-4230-8a9b-49dc8d84c344,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:19.000646 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a-shm.mount: Deactivated successfully. Jul 2 07:58:19.006385 kubelet[1550]: E0702 07:58:18.998202 1550 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:19.006385 kubelet[1550]: E0702 07:58:18.998272 1550 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-47dq7" Jul 2 07:58:19.006385 kubelet[1550]: E0702 07:58:18.998308 1550 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-47dq7" Jul 2 07:58:19.006567 kubelet[1550]: E0702 07:58:18.998368 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-47dq7_default(96966ba9-5f4e-4230-8a9b-49dc8d84c344)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-47dq7_default(96966ba9-5f4e-4230-8a9b-49dc8d84c344)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-47dq7" podUID="96966ba9-5f4e-4230-8a9b-49dc8d84c344" Jul 2 07:58:19.163456 kubelet[1550]: I0702 07:58:19.163423 1550 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:19.164580 env[1217]: time="2024-07-02T07:58:19.164535835Z" level=info msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" Jul 2 07:58:19.225949 env[1217]: time="2024-07-02T07:58:19.225877598Z" level=error msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" failed" error="failed to destroy network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:58:19.226613 kubelet[1550]: E0702 07:58:19.226383 1550 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:19.226613 kubelet[1550]: E0702 07:58:19.226442 1550 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a"} Jul 2 07:58:19.226613 kubelet[1550]: E0702 07:58:19.226492 1550 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"96966ba9-5f4e-4230-8a9b-49dc8d84c344\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:58:19.226613 kubelet[1550]: E0702 07:58:19.226527 1550 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"96966ba9-5f4e-4230-8a9b-49dc8d84c344\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-47dq7" podUID="96966ba9-5f4e-4230-8a9b-49dc8d84c344" Jul 2 07:58:19.954546 kubelet[1550]: E0702 07:58:19.954454 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:20.294932 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 07:58:20.295147 kernel: audit: type=1131 audit(1719907100.264:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:20.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:20.265325 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:58:20.311000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:58:20.326863 kernel: audit: type=1334 audit(1719907100.311:551): prog-id=58 op=UNLOAD Jul 2 07:58:20.326986 kernel: audit: type=1334 audit(1719907100.311:552): prog-id=57 op=UNLOAD Jul 2 07:58:20.311000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:58:20.311000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:58:20.335219 kernel: audit: type=1334 audit(1719907100.311:553): prog-id=56 op=UNLOAD Jul 2 07:58:20.955375 kubelet[1550]: E0702 07:58:20.955287 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:21.955651 kubelet[1550]: E0702 07:58:21.955562 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:22.956447 kubelet[1550]: E0702 07:58:22.956398 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:23.106299 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1886441033.mount: Deactivated successfully. Jul 2 07:58:23.144918 env[1217]: time="2024-07-02T07:58:23.144848877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:23.147376 env[1217]: time="2024-07-02T07:58:23.147329069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:23.149488 env[1217]: time="2024-07-02T07:58:23.149449618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:23.151382 env[1217]: time="2024-07-02T07:58:23.151340726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:23.152038 env[1217]: time="2024-07-02T07:58:23.151997368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:58:23.175211 env[1217]: time="2024-07-02T07:58:23.175159920Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:58:23.197407 env[1217]: time="2024-07-02T07:58:23.197349002Z" level=info msg="CreateContainer within sandbox \"a0e9df4c78a0c3d8425636ff7f0df8f10537a3f34671af376bd8260162cbd947\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d\"" Jul 2 07:58:23.198164 env[1217]: time="2024-07-02T07:58:23.198073466Z" level=info msg="StartContainer for \"c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d\"" Jul 2 07:58:23.224059 systemd[1]: Started cri-containerd-c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d.scope. Jul 2 07:58:23.259000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.313917 kernel: audit: type=1400 audit(1719907103.259:554): avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.314075 kernel: audit: type=1300 audit(1719907103.259:554): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7814633a88 items=0 ppid=1640 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.259000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7814633a88 items=0 ppid=1640 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306237636564373634346563653265643062333239323266323532 Jul 2 07:58:23.343177 kernel: audit: type=1327 audit(1719907103.259:554): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306237636564373634346563653265643062333239323266323532 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.386070 kernel: audit: type=1400 audit(1719907103.265:555): avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.386291 kernel: audit: type=1400 audit(1719907103.265:555): avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.389127 env[1217]: time="2024-07-02T07:58:23.389068823Z" level=info msg="StartContainer for \"c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d\" returns successfully" Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.408176 kernel: audit: type=1400 audit(1719907103.265:555): avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.265000 audit: BPF prog-id=81 op=LOAD Jul 2 07:58:23.265000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000294208 items=0 ppid=1640 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306237636564373634346563653265643062333239323266323532 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit: BPF prog-id=82 op=LOAD Jul 2 07:58:23.280000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000294258 items=0 ppid=1640 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306237636564373634346563653265643062333239323266323532 Jul 2 07:58:23.280000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:58:23.280000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:23.280000 audit: BPF prog-id=83 op=LOAD Jul 2 07:58:23.280000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002942e8 items=0 ppid=1640 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:23.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306237636564373634346563653265643062333239323266323532 Jul 2 07:58:23.503066 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:58:23.503240 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Jul 2 07:58:23.957488 kubelet[1550]: E0702 07:58:23.957420 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:24.844000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=19912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.846000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=19915 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.846000 audit[2208]: AVC avc: denied { write } for pid=2208 comm="tee" name="fd" dev="proc" ino=18996 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.846000 audit[2208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff323dc9fc a2=241 a3=1b6 items=1 ppid=2182 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.844000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc593149eb a2=241 a3=1b6 items=1 ppid=2176 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.846000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:58:24.846000 audit: PATH item=0 name="/dev/fd/63" inode=18986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.844000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:58:24.844000 audit: PATH item=0 name="/dev/fd/63" inode=19901 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.846000 audit[2206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb3f0a9fd a2=241 a3=1b6 items=1 ppid=2169 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.844000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.846000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:58:24.846000 audit: PATH item=0 name="/dev/fd/63" inode=19904 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.863000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=19922 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.866000 audit[2227]: AVC avc: denied { write } for pid=2227 comm="tee" name="fd" dev="proc" ino=19927 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.867000 audit[2224]: AVC avc: denied { write } for pid=2224 comm="tee" name="fd" dev="proc" ino=19930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.870000 audit[2220]: AVC avc: denied { write } for pid=2220 comm="tee" name="fd" dev="proc" ino=19006 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:58:24.870000 audit[2220]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d2069fb a2=241 a3=1b6 items=1 ppid=2171 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.870000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:58:24.870000 audit: PATH item=0 name="/dev/fd/63" inode=18989 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.867000 audit[2224]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff951d09fb a2=241 a3=1b6 items=1 ppid=2184 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.867000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:58:24.867000 audit: PATH item=0 name="/dev/fd/63" inode=19909 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.867000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.863000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1ee339fb a2=241 a3=1b6 items=1 ppid=2179 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.863000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:58:24.863000 audit: PATH item=0 name="/dev/fd/63" inode=18990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.866000 audit[2227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5b4519ec a2=241 a3=1b6 items=1 ppid=2173 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.866000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:58:24.866000 audit: PATH item=0 name="/dev/fd/63" inode=18993 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:58:24.866000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:58:24.929922 kubelet[1550]: E0702 07:58:24.929859 1550 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:24.958567 kubelet[1550]: E0702 07:58:24.958495 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:25.174424 kernel: Initializing XFRM netlink socket Jul 2 07:58:25.316180 systemd-networkd[1023]: vxlan.calico: Link UP Jul 2 07:58:25.316193 systemd-networkd[1023]: vxlan.calico: Gained carrier Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379111 kernel: kauditd_printk_skb: 72 callbacks suppressed Jul 2 07:58:25.379291 kernel: audit: type=1400 audit(1719907105.351:567): avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.393408 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:25.393601 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:58:25.393692 kernel: audit: backlog limit exceeded Jul 2 07:58:25.397557 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:25.410297 kernel: audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:58:25.410396 kernel: audit: backlog limit exceeded Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.439134 kernel: audit: type=1400 audit(1719907105.351:567): avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.439232 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:58:25.439267 kernel: audit: type=1400 audit(1719907105.351:567): avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.351000 audit: BPF prog-id=84 op=LOAD Jul 2 07:58:25.351000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe58d29440 a2=70 a3=7f84f4501000 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.357000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.357000 audit: BPF prog-id=85 op=LOAD Jul 2 07:58:25.357000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe58d29440 a2=70 a3=6f items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.357000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.378000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe58d293f0 a2=70 a3=7ffe58d29440 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.378000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit: BPF prog-id=86 op=LOAD Jul 2 07:58:25.378000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe58d293d0 a2=70 a3=7ffe58d29440 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.378000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.378000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe58d294b0 a2=70 a3=0 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.378000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe58d294a0 a2=70 a3=0 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.378000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.378000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.378000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe58d29410 a2=70 a3=0 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.378000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe58d294e0 a2=70 a3=213d8b0 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.379000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe58d294e0 a2=70 a3=213a880 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.379000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.379000 audit: BPF prog-id=87 op=LOAD Jul 2 07:58:25.379000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe58d29400 a2=70 a3=0 items=0 ppid=2185 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.379000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:58:25.468000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.468000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc5a4a0dc0 a2=70 a3=fff80800 items=0 ppid=2185 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:25.469000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:25.469000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc5a4a0c90 a2=70 a3=3 items=0 ppid=2185 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:58:25.476000 audit: BPF prog-id=87 op=UNLOAD Jul 2 07:58:25.552000 audit[2342]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:25.555000 audit[2340]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:25.555000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffeee9db3e0 a2=0 a3=7ffeee9db3cc items=0 ppid=2185 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:25.552000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe4c7b4270 a2=0 a3=7ffe4c7b425c items=0 ppid=2185 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.552000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:25.567000 audit[2341]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:25.567000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffee3ccc510 a2=0 a3=7ffee3ccc4fc items=0 ppid=2185 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:25.577000 audit[2343]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:25.577000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffa3e70bb0 a2=0 a3=7fffa3e70b9c items=0 ppid=2185 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:25.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:25.959069 kubelet[1550]: E0702 07:58:25.958909 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:26.959586 kubelet[1550]: E0702 07:58:26.959508 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:27.053845 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Jul 2 07:58:27.959887 kubelet[1550]: E0702 07:58:27.959817 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:28.114688 env[1217]: time="2024-07-02T07:58:28.114542066Z" level=info msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" Jul 2 07:58:28.169129 kubelet[1550]: I0702 07:58:28.168712 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-2z5bb" podStartSLOduration=8.010112151 podStartE2EDuration="23.168681205s" podCreationTimestamp="2024-07-02 07:58:05 +0000 UTC" firstStartedPulling="2024-07-02 07:58:07.994565459 +0000 UTC m=+3.535122970" lastFinishedPulling="2024-07-02 07:58:23.153134508 +0000 UTC m=+18.693692024" observedRunningTime="2024-07-02 07:58:24.296132905 +0000 UTC m=+19.836690426" watchObservedRunningTime="2024-07-02 07:58:28.168681205 +0000 UTC m=+23.709238725" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.167 [INFO][2365] k8s.go 608: Cleaning up netns ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.167 [INFO][2365] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" iface="eth0" netns="/var/run/netns/cni-5e925819-ecd6-6952-c5c2-fe5b86abe824" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.167 [INFO][2365] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" iface="eth0" netns="/var/run/netns/cni-5e925819-ecd6-6952-c5c2-fe5b86abe824" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.167 [INFO][2365] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" iface="eth0" netns="/var/run/netns/cni-5e925819-ecd6-6952-c5c2-fe5b86abe824" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.167 [INFO][2365] k8s.go 615: Releasing IP address(es) ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.168 [INFO][2365] utils.go 188: Calico CNI releasing IP address ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.195 [INFO][2371] ipam_plugin.go 411: Releasing address using handleID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.195 [INFO][2371] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.195 [INFO][2371] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.202 [WARNING][2371] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.202 [INFO][2371] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.203 [INFO][2371] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:28.206201 env[1217]: 2024-07-02 07:58:28.204 [INFO][2365] k8s.go 621: Teardown processing complete. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:58:28.212610 env[1217]: time="2024-07-02T07:58:28.208260022Z" level=info msg="TearDown network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" successfully" Jul 2 07:58:28.212610 env[1217]: time="2024-07-02T07:58:28.208310186Z" level=info msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" returns successfully" Jul 2 07:58:28.210436 systemd[1]: run-netns-cni\x2d5e925819\x2decd6\x2d6952\x2dc5c2\x2dfe5b86abe824.mount: Deactivated successfully. Jul 2 07:58:28.213581 env[1217]: time="2024-07-02T07:58:28.213540065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zkzp9,Uid:76ac96d4-c8f8-431e-ba50-ef7161db58b4,Namespace:calico-system,Attempt:1,}" Jul 2 07:58:28.364932 systemd-networkd[1023]: calif86b0673573: Link UP Jul 2 07:58:28.369328 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:28.369439 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif86b0673573: link becomes ready Jul 2 07:58:28.377406 systemd-networkd[1023]: calif86b0673573: Gained carrier Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.279 [INFO][2378] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.13-k8s-csi--node--driver--zkzp9-eth0 csi-node-driver- calico-system 76ac96d4-c8f8-431e-ba50-ef7161db58b4 998 0 2024-07-02 07:58:05 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.13 csi-node-driver-zkzp9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calif86b0673573 [] []}} ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.279 [INFO][2378] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.313 [INFO][2390] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" HandleID="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.325 [INFO][2390] ipam_plugin.go 264: Auto assigning IP ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" HandleID="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00037a6f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.13", "pod":"csi-node-driver-zkzp9", "timestamp":"2024-07-02 07:58:28.313728283 +0000 UTC"}, Hostname:"10.128.0.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.325 [INFO][2390] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.326 [INFO][2390] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.326 [INFO][2390] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.13' Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.328 [INFO][2390] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.332 [INFO][2390] ipam.go 372: Looking up existing affinities for host host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.339 [INFO][2390] ipam.go 489: Trying affinity for 192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.341 [INFO][2390] ipam.go 155: Attempting to load block cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.344 [INFO][2390] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.344 [INFO][2390] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.64/26 handle="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.346 [INFO][2390] ipam.go 1685: Creating new handle: k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066 Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.350 [INFO][2390] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.64/26 handle="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.356 [INFO][2390] ipam.go 1216: Successfully claimed IPs: [192.168.34.65/26] block=192.168.34.64/26 handle="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.356 [INFO][2390] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.65/26] handle="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" host="10.128.0.13" Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.356 [INFO][2390] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:28.399465 env[1217]: 2024-07-02 07:58:28.356 [INFO][2390] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.34.65/26] IPv6=[] ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" HandleID="k8s-pod-network.12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.359 [INFO][2378] k8s.go 386: Populated endpoint ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-csi--node--driver--zkzp9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ac96d4-c8f8-431e-ba50-ef7161db58b4", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"", Pod:"csi-node-driver-zkzp9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif86b0673573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.359 [INFO][2378] k8s.go 387: Calico CNI using IPs: [192.168.34.65/32] ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.359 [INFO][2378] dataplane_linux.go 68: Setting the host side veth name to calif86b0673573 ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.379 [INFO][2378] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.379 [INFO][2378] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-csi--node--driver--zkzp9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ac96d4-c8f8-431e-ba50-ef7161db58b4", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066", Pod:"csi-node-driver-zkzp9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif86b0673573", MAC:"5e:1d:0d:82:b3:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:28.400776 env[1217]: 2024-07-02 07:58:28.396 [INFO][2378] k8s.go 500: Wrote updated endpoint to datastore ContainerID="12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066" Namespace="calico-system" Pod="csi-node-driver-zkzp9" WorkloadEndpoint="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:58:28.412000 audit[2405]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:28.412000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffece0d490 a2=0 a3=7fffece0d47c items=0 ppid=2185 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:28.422640 env[1217]: time="2024-07-02T07:58:28.422560382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:28.422640 env[1217]: time="2024-07-02T07:58:28.422611957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:28.422909 env[1217]: time="2024-07-02T07:58:28.422861215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:28.423337 env[1217]: time="2024-07-02T07:58:28.423230470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066 pid=2417 runtime=io.containerd.runc.v2 Jul 2 07:58:28.450463 systemd[1]: Started cri-containerd-12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066.scope. Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.467000 audit: BPF prog-id=88 op=LOAD Jul 2 07:58:28.469000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.469000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2417 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132373039643164326238633638326663386636393539316638323430 Jul 2 07:58:28.469000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.469000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2417 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132373039643164326238633638326663386636393539316638323430 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit: BPF prog-id=89 op=LOAD Jul 2 07:58:28.470000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d1db0 items=0 ppid=2417 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132373039643164326238633638326663386636393539316638323430 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit: BPF prog-id=90 op=LOAD Jul 2 07:58:28.470000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d1df8 items=0 ppid=2417 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132373039643164326238633638326663386636393539316638323430 Jul 2 07:58:28.470000 audit: BPF prog-id=90 op=UNLOAD Jul 2 07:58:28.470000 audit: BPF prog-id=89 op=UNLOAD Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:28.470000 audit: BPF prog-id=91 op=LOAD Jul 2 07:58:28.470000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4208 items=0 ppid=2417 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132373039643164326238633638326663386636393539316638323430 Jul 2 07:58:28.487542 env[1217]: time="2024-07-02T07:58:28.487484588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zkzp9,Uid:76ac96d4-c8f8-431e-ba50-ef7161db58b4,Namespace:calico-system,Attempt:1,} returns sandbox id \"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066\"" Jul 2 07:58:28.489782 env[1217]: time="2024-07-02T07:58:28.489738776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:58:28.960519 kubelet[1550]: E0702 07:58:28.960453 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:29.430424 env[1217]: time="2024-07-02T07:58:29.430356505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:29.433226 env[1217]: time="2024-07-02T07:58:29.433174737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:29.435460 env[1217]: time="2024-07-02T07:58:29.435395219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:29.437569 env[1217]: time="2024-07-02T07:58:29.437528128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:29.438261 env[1217]: time="2024-07-02T07:58:29.438216930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:58:29.442040 env[1217]: time="2024-07-02T07:58:29.442001877Z" level=info msg="CreateContainer within sandbox \"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:58:29.459550 env[1217]: time="2024-07-02T07:58:29.459502508Z" level=info msg="CreateContainer within sandbox \"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ced1febe684fcf012d94492e62024aeeb244af6c58e8af22072092730f7067aa\"" Jul 2 07:58:29.460505 env[1217]: time="2024-07-02T07:58:29.460470285Z" level=info msg="StartContainer for \"ced1febe684fcf012d94492e62024aeeb244af6c58e8af22072092730f7067aa\"" Jul 2 07:58:29.488815 systemd[1]: Started cri-containerd-ced1febe684fcf012d94492e62024aeeb244af6c58e8af22072092730f7067aa.scope. Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f337b771738 items=0 ppid=2417 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:29.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643166656265363834666366303132643934343932653632303234 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit: BPF prog-id=92 op=LOAD Jul 2 07:58:29.513000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000331d98 items=0 ppid=2417 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:29.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643166656265363834666366303132643934343932653632303234 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit: BPF prog-id=93 op=LOAD Jul 2 07:58:29.513000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000331de8 items=0 ppid=2417 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:29.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643166656265363834666366303132643934343932653632303234 Jul 2 07:58:29.513000 audit: BPF prog-id=93 op=UNLOAD Jul 2 07:58:29.513000 audit: BPF prog-id=92 op=UNLOAD Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:29.513000 audit: BPF prog-id=94 op=LOAD Jul 2 07:58:29.513000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000331e78 items=0 ppid=2417 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:29.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643166656265363834666366303132643934343932653632303234 Jul 2 07:58:29.537247 env[1217]: time="2024-07-02T07:58:29.537177629Z" level=info msg="StartContainer for \"ced1febe684fcf012d94492e62024aeeb244af6c58e8af22072092730f7067aa\" returns successfully" Jul 2 07:58:29.538836 env[1217]: time="2024-07-02T07:58:29.538788632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:58:29.869332 systemd-networkd[1023]: calif86b0673573: Gained IPv6LL Jul 2 07:58:29.961239 kubelet[1550]: E0702 07:58:29.961165 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:30.555108 env[1217]: time="2024-07-02T07:58:30.555010400Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:30.558059 env[1217]: time="2024-07-02T07:58:30.558009503Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:30.560219 env[1217]: time="2024-07-02T07:58:30.560176789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:30.564587 env[1217]: time="2024-07-02T07:58:30.563180582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:30.564587 env[1217]: time="2024-07-02T07:58:30.563573759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:58:30.570176 env[1217]: time="2024-07-02T07:58:30.568916094Z" level=info msg="CreateContainer within sandbox \"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:58:30.590047 env[1217]: time="2024-07-02T07:58:30.589989907Z" level=info msg="CreateContainer within sandbox \"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8c6734477baddf2a2b971d347dacf7ee093cdb34b36abe124f47e1729710eabb\"" Jul 2 07:58:30.591084 env[1217]: time="2024-07-02T07:58:30.591049192Z" level=info msg="StartContainer for \"8c6734477baddf2a2b971d347dacf7ee093cdb34b36abe124f47e1729710eabb\"" Jul 2 07:58:30.633926 systemd[1]: Started cri-containerd-8c6734477baddf2a2b971d347dacf7ee093cdb34b36abe124f47e1729710eabb.scope. Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.663130 kernel: kauditd_printk_skb: 188 callbacks suppressed Jul 2 07:58:30.663249 kernel: audit: type=1400 audit(1719907110.656:612): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7874054698 items=0 ppid=2417 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.716368 kernel: audit: type=1300 audit(1719907110.656:612): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7874054698 items=0 ppid=2417 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363733343437376261646466326132623937316433343764616366 Jul 2 07:58:30.745813 kernel: audit: type=1327 audit(1719907110.656:612): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363733343437376261646466326132623937316433343764616366 Jul 2 07:58:30.745924 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.786479 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.807211 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.809152 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.811340 env[1217]: time="2024-07-02T07:58:30.811287611Z" level=info msg="StartContainer for \"8c6734477baddf2a2b971d347dacf7ee093cdb34b36abe124f47e1729710eabb\" returns successfully" Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.829143 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.849184 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.890797 kernel: audit: type=1400 audit(1719907110.656:613): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.656000 audit: BPF prog-id=95 op=LOAD Jul 2 07:58:30.656000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000312908 items=0 ppid=2417 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363733343437376261646466326132623937316433343764616366 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit: BPF prog-id=96 op=LOAD Jul 2 07:58:30.715000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000312958 items=0 ppid=2417 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363733343437376261646466326132623937316433343764616366 Jul 2 07:58:30.715000 audit: BPF prog-id=96 op=UNLOAD Jul 2 07:58:30.715000 audit: BPF prog-id=95 op=UNLOAD Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:30.715000 audit: BPF prog-id=97 op=LOAD Jul 2 07:58:30.715000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003129e8 items=0 ppid=2417 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363733343437376261646466326132623937316433343764616366 Jul 2 07:58:30.961888 kubelet[1550]: E0702 07:58:30.961801 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:31.063708 kubelet[1550]: I0702 07:58:31.063657 1550 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:58:31.063708 kubelet[1550]: I0702 07:58:31.063709 1550 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:58:31.115753 env[1217]: time="2024-07-02T07:58:31.115698313Z" level=info msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" Jul 2 07:58:31.217738 kubelet[1550]: I0702 07:58:31.217558 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-zkzp9" podStartSLOduration=24.139831377 podStartE2EDuration="26.217533996s" podCreationTimestamp="2024-07-02 07:58:05 +0000 UTC" firstStartedPulling="2024-07-02 07:58:28.48907302 +0000 UTC m=+24.029630522" lastFinishedPulling="2024-07-02 07:58:30.566775623 +0000 UTC m=+26.107333141" observedRunningTime="2024-07-02 07:58:31.217169988 +0000 UTC m=+26.757727513" watchObservedRunningTime="2024-07-02 07:58:31.217533996 +0000 UTC m=+26.758091520" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.167 [INFO][2542] k8s.go 608: Cleaning up netns ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.168 [INFO][2542] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" iface="eth0" netns="/var/run/netns/cni-d355ef9a-39f9-0502-6692-d446f455d686" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.168 [INFO][2542] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" iface="eth0" netns="/var/run/netns/cni-d355ef9a-39f9-0502-6692-d446f455d686" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.168 [INFO][2542] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" iface="eth0" netns="/var/run/netns/cni-d355ef9a-39f9-0502-6692-d446f455d686" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.168 [INFO][2542] k8s.go 615: Releasing IP address(es) ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.168 [INFO][2542] utils.go 188: Calico CNI releasing IP address ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.193 [INFO][2548] ipam_plugin.go 411: Releasing address using handleID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.193 [INFO][2548] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.193 [INFO][2548] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.200 [WARNING][2548] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.203 [INFO][2548] ipam_plugin.go 439: Releasing address using workloadID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.214 [INFO][2548] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:31.218571 env[1217]: 2024-07-02 07:58:31.216 [INFO][2542] k8s.go 621: Teardown processing complete. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:58:31.221924 systemd[1]: run-netns-cni\x2dd355ef9a\x2d39f9\x2d0502\x2d6692\x2dd446f455d686.mount: Deactivated successfully. Jul 2 07:58:31.224477 env[1217]: time="2024-07-02T07:58:31.224426096Z" level=info msg="TearDown network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" successfully" Jul 2 07:58:31.224608 env[1217]: time="2024-07-02T07:58:31.224475374Z" level=info msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" returns successfully" Jul 2 07:58:31.225281 env[1217]: time="2024-07-02T07:58:31.225220777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-47dq7,Uid:96966ba9-5f4e-4230-8a9b-49dc8d84c344,Namespace:default,Attempt:1,}" Jul 2 07:58:31.374058 systemd-networkd[1023]: calid0394ccaf7e: Link UP Jul 2 07:58:31.389442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:31.389581 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid0394ccaf7e: link becomes ready Jul 2 07:58:31.390039 systemd-networkd[1023]: calid0394ccaf7e: Gained carrier Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.284 [INFO][2554] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0 nginx-deployment-85f456d6dd- default 96966ba9-5f4e-4230-8a9b-49dc8d84c344 1020 0 2024-07-02 07:58:18 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.13 nginx-deployment-85f456d6dd-47dq7 eth0 default [] [] [kns.default ksa.default.default] calid0394ccaf7e [] []}} ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.285 [INFO][2554] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.321 [INFO][2566] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" HandleID="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.332 [INFO][2566] ipam_plugin.go 264: Auto assigning IP ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" HandleID="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efac0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.13", "pod":"nginx-deployment-85f456d6dd-47dq7", "timestamp":"2024-07-02 07:58:31.321273014 +0000 UTC"}, Hostname:"10.128.0.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.332 [INFO][2566] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.332 [INFO][2566] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.332 [INFO][2566] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.13' Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.334 [INFO][2566] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.338 [INFO][2566] ipam.go 372: Looking up existing affinities for host host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.344 [INFO][2566] ipam.go 489: Trying affinity for 192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.346 [INFO][2566] ipam.go 155: Attempting to load block cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.355 [INFO][2566] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.355 [INFO][2566] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.64/26 handle="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.356 [INFO][2566] ipam.go 1685: Creating new handle: k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79 Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.361 [INFO][2566] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.64/26 handle="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.367 [INFO][2566] ipam.go 1216: Successfully claimed IPs: [192.168.34.66/26] block=192.168.34.64/26 handle="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.367 [INFO][2566] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.66/26] handle="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" host="10.128.0.13" Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.367 [INFO][2566] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:31.404138 env[1217]: 2024-07-02 07:58:31.367 [INFO][2566] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.34.66/26] IPv6=[] ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" HandleID="k8s-pod-network.be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.370 [INFO][2554] k8s.go 386: Populated endpoint ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"96966ba9-5f4e-4230-8a9b-49dc8d84c344", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-47dq7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid0394ccaf7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.370 [INFO][2554] k8s.go 387: Calico CNI using IPs: [192.168.34.66/32] ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.370 [INFO][2554] dataplane_linux.go 68: Setting the host side veth name to calid0394ccaf7e ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.391 [INFO][2554] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.391 [INFO][2554] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"96966ba9-5f4e-4230-8a9b-49dc8d84c344", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79", Pod:"nginx-deployment-85f456d6dd-47dq7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid0394ccaf7e", MAC:"be:a3:63:ee:58:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:31.410075 env[1217]: 2024-07-02 07:58:31.398 [INFO][2554] k8s.go 500: Wrote updated endpoint to datastore ContainerID="be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79" Namespace="default" Pod="nginx-deployment-85f456d6dd-47dq7" WorkloadEndpoint="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:58:31.424000 audit[2586]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=2586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:31.424000 audit[2586]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcd9d900b0 a2=0 a3=7ffcd9d9009c items=0 ppid=2185 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.424000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:31.433716 env[1217]: time="2024-07-02T07:58:31.433475006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:31.433716 env[1217]: time="2024-07-02T07:58:31.433528155Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:31.433716 env[1217]: time="2024-07-02T07:58:31.433548218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:31.433983 env[1217]: time="2024-07-02T07:58:31.433784623Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79 pid=2594 runtime=io.containerd.runc.v2 Jul 2 07:58:31.450880 systemd[1]: Started cri-containerd-be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79.scope. Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.473000 audit: BPF prog-id=98 op=LOAD Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2594 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326663666266336261346534633533316566326363636262336136 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2594 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326663666266336261346534633533316566326363636262336136 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit: BPF prog-id=99 op=LOAD Jul 2 07:58:31.474000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000226670 items=0 ppid=2594 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326663666266336261346534633533316566326363636262336136 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.474000 audit: BPF prog-id=100 op=LOAD Jul 2 07:58:31.474000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002266b8 items=0 ppid=2594 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326663666266336261346534633533316566326363636262336136 Jul 2 07:58:31.475000 audit: BPF prog-id=100 op=UNLOAD Jul 2 07:58:31.475000 audit: BPF prog-id=99 op=UNLOAD Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:31.475000 audit: BPF prog-id=101 op=LOAD Jul 2 07:58:31.475000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000226ac8 items=0 ppid=2594 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:31.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265326663666266336261346534633533316566326363636262336136 Jul 2 07:58:31.518127 env[1217]: time="2024-07-02T07:58:31.518050657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-47dq7,Uid:96966ba9-5f4e-4230-8a9b-49dc8d84c344,Namespace:default,Attempt:1,} returns sandbox id \"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79\"" Jul 2 07:58:31.521340 env[1217]: time="2024-07-02T07:58:31.521285254Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:58:31.962561 kubelet[1550]: E0702 07:58:31.962513 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:32.807164 kubelet[1550]: I0702 07:58:32.807019 1550 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:58:32.813663 systemd-networkd[1023]: calid0394ccaf7e: Gained IPv6LL Jul 2 07:58:32.859813 systemd[1]: run-containerd-runc-k8s.io-c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d-runc.qEtJ6U.mount: Deactivated successfully. Jul 2 07:58:32.963512 kubelet[1550]: E0702 07:58:32.963430 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:33.590215 systemd[1]: run-containerd-runc-k8s.io-c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d-runc.SkX9Yp.mount: Deactivated successfully. Jul 2 07:58:33.964418 kubelet[1550]: E0702 07:58:33.964129 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:34.142041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2775199666.mount: Deactivated successfully. Jul 2 07:58:34.801001 update_engine[1205]: I0702 07:58:34.800184 1205 update_attempter.cc:509] Updating boot flags... Jul 2 07:58:34.964555 kubelet[1550]: E0702 07:58:34.964493 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.962733 env[1217]: time="2024-07-02T07:58:35.962643236Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.965163 kubelet[1550]: E0702 07:58:35.965123 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:35.965923 env[1217]: time="2024-07-02T07:58:35.965868210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.969677 env[1217]: time="2024-07-02T07:58:35.969637008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.971662 env[1217]: time="2024-07-02T07:58:35.971620108Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:35.972972 env[1217]: time="2024-07-02T07:58:35.972928330Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:58:35.976739 env[1217]: time="2024-07-02T07:58:35.976684203Z" level=info msg="CreateContainer within sandbox \"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 07:58:35.995464 env[1217]: time="2024-07-02T07:58:35.995401608Z" level=info msg="CreateContainer within sandbox \"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"79e48da283eb801eef98b64155cc891873e030a0e63e5243beb1b6b6f2bee034\"" Jul 2 07:58:35.996297 env[1217]: time="2024-07-02T07:58:35.996248184Z" level=info msg="StartContainer for \"79e48da283eb801eef98b64155cc891873e030a0e63e5243beb1b6b6f2bee034\"" Jul 2 07:58:36.021501 systemd[1]: Started cri-containerd-79e48da283eb801eef98b64155cc891873e030a0e63e5243beb1b6b6f2bee034.scope. Jul 2 07:58:36.082882 kernel: kauditd_printk_skb: 93 callbacks suppressed Jul 2 07:58:36.083048 kernel: audit: type=1400 audit(1719907116.055:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.105247 kernel: audit: type=1400 audit(1719907116.055:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.105352 kernel: audit: type=1400 audit(1719907116.056:639): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146639 kernel: audit: type=1400 audit(1719907116.056:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146745 kernel: audit: type=1400 audit(1719907116.056:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.188286 kernel: audit: type=1400 audit(1719907116.056:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.188437 kernel: audit: type=1400 audit(1719907116.056:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.230592 kernel: audit: type=1400 audit(1719907116.056:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.231405 kernel: audit: type=1400 audit(1719907116.056:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.273594 kernel: audit: type=1400 audit(1719907116.082:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.082000 audit: BPF prog-id=102 op=LOAD Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2594 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653438646132383365623830316565663938623634313535636338 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2594 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653438646132383365623830316565663938623634313535636338 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.083000 audit: BPF prog-id=103 op=LOAD Jul 2 07:58:36.083000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030bfd0 items=0 ppid=2594 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653438646132383365623830316565663938623634313535636338 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.103000 audit: BPF prog-id=104 op=LOAD Jul 2 07:58:36.103000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000412018 items=0 ppid=2594 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653438646132383365623830316565663938623634313535636338 Jul 2 07:58:36.145000 audit: BPF prog-id=104 op=UNLOAD Jul 2 07:58:36.145000 audit: BPF prog-id=103 op=UNLOAD Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:36.146000 audit: BPF prog-id=105 op=LOAD Jul 2 07:58:36.146000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000412428 items=0 ppid=2594 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653438646132383365623830316565663938623634313535636338 Jul 2 07:58:36.280453 env[1217]: time="2024-07-02T07:58:36.279295492Z" level=info msg="StartContainer for \"79e48da283eb801eef98b64155cc891873e030a0e63e5243beb1b6b6f2bee034\" returns successfully" Jul 2 07:58:36.966258 kubelet[1550]: E0702 07:58:36.966192 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:37.249762 kubelet[1550]: I0702 07:58:37.249502 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-47dq7" podStartSLOduration=14.794681329 podStartE2EDuration="19.249478466s" podCreationTimestamp="2024-07-02 07:58:18 +0000 UTC" firstStartedPulling="2024-07-02 07:58:31.520327925 +0000 UTC m=+27.060885437" lastFinishedPulling="2024-07-02 07:58:35.975125059 +0000 UTC m=+31.515682574" observedRunningTime="2024-07-02 07:58:37.249254665 +0000 UTC m=+32.789812185" watchObservedRunningTime="2024-07-02 07:58:37.249478466 +0000 UTC m=+32.790035987" Jul 2 07:58:37.966627 kubelet[1550]: E0702 07:58:37.966562 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:38.967151 kubelet[1550]: E0702 07:58:38.967071 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:39.968045 kubelet[1550]: E0702 07:58:39.967987 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:40.968632 kubelet[1550]: E0702 07:58:40.968567 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:41.969029 kubelet[1550]: E0702 07:58:41.968962 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:42.969708 kubelet[1550]: E0702 07:58:42.969647 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:43.970456 kubelet[1550]: E0702 07:58:43.970392 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:44.929976 kubelet[1550]: E0702 07:58:44.929906 1550 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:44.971314 kubelet[1550]: E0702 07:58:44.971262 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:45.161000 audit[2760]: NETFILTER_CFG table=filter:75 family=2 entries=22 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.167107 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:58:45.167196 kernel: audit: type=1325 audit(1719907125.161:655): table=filter:75 family=2 entries=22 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.185135 kernel: audit: type=1300 audit(1719907125.161:655): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffcee2c9750 a2=0 a3=7ffcee2c973c items=0 ppid=1780 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.161000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffcee2c9750 a2=0 a3=7ffcee2c973c items=0 ppid=1780 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.208295 kubelet[1550]: I0702 07:58:45.207535 1550 topology_manager.go:215] "Topology Admit Handler" podUID="8f758a1e-8587-4866-ba80-082e3300f857" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 07:58:45.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.224634 systemd[1]: Created slice kubepods-besteffort-pod8f758a1e_8587_4866_ba80_082e3300f857.slice. Jul 2 07:58:45.162000 audit[2760]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.248649 kernel: audit: type=1327 audit(1719907125.161:655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.248747 kernel: audit: type=1325 audit(1719907125.162:656): table=nat:76 family=2 entries=20 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.248789 kernel: audit: type=1300 audit(1719907125.162:656): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcee2c9750 a2=0 a3=0 items=0 ppid=1780 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.162000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcee2c9750 a2=0 a3=0 items=0 ppid=1780 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.295926 kernel: audit: type=1327 audit(1719907125.162:656): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.305000 audit[2762]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.305000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffee53d7480 a2=0 a3=7ffee53d746c items=0 ppid=1780 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.354817 kernel: audit: type=1325 audit(1719907125.305:657): table=filter:77 family=2 entries=34 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.354950 kernel: audit: type=1300 audit(1719907125.305:657): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffee53d7480 a2=0 a3=7ffee53d746c items=0 ppid=1780 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.354992 kernel: audit: type=1327 audit(1719907125.305:657): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.305000 audit[2762]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.305000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffee53d7480 a2=0 a3=0 items=0 ppid=1780 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.388661 kubelet[1550]: I0702 07:58:45.388578 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8f758a1e-8587-4866-ba80-082e3300f857-data\") pod \"nfs-server-provisioner-0\" (UID: \"8f758a1e-8587-4866-ba80-082e3300f857\") " pod="default/nfs-server-provisioner-0" Jul 2 07:58:45.388661 kubelet[1550]: I0702 07:58:45.388635 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rqklk\" (UniqueName: \"kubernetes.io/projected/8f758a1e-8587-4866-ba80-082e3300f857-kube-api-access-rqklk\") pod \"nfs-server-provisioner-0\" (UID: \"8f758a1e-8587-4866-ba80-082e3300f857\") " pod="default/nfs-server-provisioner-0" Jul 2 07:58:45.389131 kernel: audit: type=1325 audit(1719907125.305:658): table=nat:78 family=2 entries=20 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.530539 env[1217]: time="2024-07-02T07:58:45.530405120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8f758a1e-8587-4866-ba80-082e3300f857,Namespace:default,Attempt:0,}" Jul 2 07:58:45.693993 systemd-networkd[1023]: cali60e51b789ff: Link UP Jul 2 07:58:45.708663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:45.708790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 07:58:45.709231 systemd-networkd[1023]: cali60e51b789ff: Gained carrier Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.610 [INFO][2764] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8f758a1e-8587-4866-ba80-082e3300f857 1086 0 2024-07-02 07:58:45 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.610 [INFO][2764] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.647 [INFO][2786] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" HandleID="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Workload="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.657 [INFO][2786] ipam_plugin.go 264: Auto assigning IP ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" HandleID="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Workload="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031bd00), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 07:58:45.647961092 +0000 UTC"}, Hostname:"10.128.0.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.657 [INFO][2786] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.657 [INFO][2786] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.657 [INFO][2786] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.13' Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.659 [INFO][2786] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.663 [INFO][2786] ipam.go 372: Looking up existing affinities for host host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.668 [INFO][2786] ipam.go 489: Trying affinity for 192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.670 [INFO][2786] ipam.go 155: Attempting to load block cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.672 [INFO][2786] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.672 [INFO][2786] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.64/26 handle="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.674 [INFO][2786] ipam.go 1685: Creating new handle: k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3 Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.678 [INFO][2786] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.64/26 handle="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.684 [INFO][2786] ipam.go 1216: Successfully claimed IPs: [192.168.34.67/26] block=192.168.34.64/26 handle="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.684 [INFO][2786] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.67/26] handle="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" host="10.128.0.13" Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.685 [INFO][2786] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:45.723240 env[1217]: 2024-07-02 07:58:45.685 [INFO][2786] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.34.67/26] IPv6=[] ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" HandleID="k8s-pod-network.02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Workload="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.724527 env[1217]: 2024-07-02 07:58:45.686 [INFO][2764] k8s.go 386: Populated endpoint ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8f758a1e-8587-4866-ba80-082e3300f857", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 45, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:45.724527 env[1217]: 2024-07-02 07:58:45.686 [INFO][2764] k8s.go 387: Calico CNI using IPs: [192.168.34.67/32] ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.724527 env[1217]: 2024-07-02 07:58:45.686 [INFO][2764] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.724527 env[1217]: 2024-07-02 07:58:45.709 [INFO][2764] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.724890 env[1217]: 2024-07-02 07:58:45.710 [INFO][2764] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8f758a1e-8587-4866-ba80-082e3300f857", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 45, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"26:d9:dc:1c:43:b9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:45.724890 env[1217]: 2024-07-02 07:58:45.717 [INFO][2764] k8s.go 500: Wrote updated endpoint to datastore ContainerID="02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.13-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:58:45.746000 audit[2808]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:45.746000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffeb07eadb0 a2=0 a3=7ffeb07ead9c items=0 ppid=2185 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:45.754513 env[1217]: time="2024-07-02T07:58:45.754419090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:45.754513 env[1217]: time="2024-07-02T07:58:45.754469254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:45.754770 env[1217]: time="2024-07-02T07:58:45.754488336Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:45.754962 env[1217]: time="2024-07-02T07:58:45.754734766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3 pid=2817 runtime=io.containerd.runc.v2 Jul 2 07:58:45.780353 systemd[1]: Started cri-containerd-02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3.scope. Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit: BPF prog-id=106 op=LOAD Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2817 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633230313538663238323530613866393664303732356362666239 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2817 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633230313538663238323530613866393664303732356362666239 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit: BPF prog-id=107 op=LOAD Jul 2 07:58:45.820000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c1e0 items=0 ppid=2817 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633230313538663238323530613866393664303732356362666239 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.820000 audit: BPF prog-id=108 op=LOAD Jul 2 07:58:45.820000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c228 items=0 ppid=2817 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633230313538663238323530613866393664303732356362666239 Jul 2 07:58:45.820000 audit: BPF prog-id=108 op=UNLOAD Jul 2 07:58:45.821000 audit: BPF prog-id=107 op=UNLOAD Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:45.821000 audit: BPF prog-id=109 op=LOAD Jul 2 07:58:45.821000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030c638 items=0 ppid=2817 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633230313538663238323530613866393664303732356362666239 Jul 2 07:58:45.856747 env[1217]: time="2024-07-02T07:58:45.856438277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8f758a1e-8587-4866-ba80-082e3300f857,Namespace:default,Attempt:0,} returns sandbox id \"02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3\"" Jul 2 07:58:45.859010 env[1217]: time="2024-07-02T07:58:45.858953244Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 07:58:45.971907 kubelet[1550]: E0702 07:58:45.971862 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:46.504487 systemd[1]: run-containerd-runc-k8s.io-02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3-runc.lSRVZ3.mount: Deactivated successfully. Jul 2 07:58:46.972902 kubelet[1550]: E0702 07:58:46.972814 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:47.726481 systemd-networkd[1023]: cali60e51b789ff: Gained IPv6LL Jul 2 07:58:47.974333 kubelet[1550]: E0702 07:58:47.974240 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:48.407012 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2417368100.mount: Deactivated successfully. Jul 2 07:58:48.974619 kubelet[1550]: E0702 07:58:48.974539 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:49.975387 kubelet[1550]: E0702 07:58:49.975317 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:50.959967 env[1217]: time="2024-07-02T07:58:50.959868914Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:50.966836 env[1217]: time="2024-07-02T07:58:50.966765445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:50.972378 env[1217]: time="2024-07-02T07:58:50.972302751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:50.973415 env[1217]: time="2024-07-02T07:58:50.973368463Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:50.974666 env[1217]: time="2024-07-02T07:58:50.974565661Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 07:58:50.975642 kubelet[1550]: E0702 07:58:50.975558 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:50.979878 env[1217]: time="2024-07-02T07:58:50.979825668Z" level=info msg="CreateContainer within sandbox \"02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 07:58:51.003011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3137898218.mount: Deactivated successfully. Jul 2 07:58:51.006902 env[1217]: time="2024-07-02T07:58:51.006833623Z" level=info msg="CreateContainer within sandbox \"02c20158f28250a8f96d0725cbfb9e6e5788e490406be0a24c013e7dd841c3e3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"df84a87a7c508e63b33e381ca5937548b7834fa655dfbaf610a119b42515da0f\"" Jul 2 07:58:51.007916 env[1217]: time="2024-07-02T07:58:51.007879371Z" level=info msg="StartContainer for \"df84a87a7c508e63b33e381ca5937548b7834fa655dfbaf610a119b42515da0f\"" Jul 2 07:58:51.038260 systemd[1]: Started cri-containerd-df84a87a7c508e63b33e381ca5937548b7834fa655dfbaf610a119b42515da0f.scope. Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.061868 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 07:58:51.061981 kernel: audit: type=1400 audit(1719907131.054:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102960 kernel: audit: type=1400 audit(1719907131.054:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.125218 kernel: audit: type=1400 audit(1719907131.054:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.147127 kernel: audit: type=1400 audit(1719907131.054:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.147323 env[1217]: time="2024-07-02T07:58:51.147079288Z" level=info msg="StartContainer for \"df84a87a7c508e63b33e381ca5937548b7834fa655dfbaf610a119b42515da0f\" returns successfully" Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.171936 kernel: audit: type=1400 audit(1719907131.054:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.214570 kernel: audit: type=1400 audit(1719907131.054:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.214734 kernel: audit: type=1400 audit(1719907131.054:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.214777 kernel: audit: type=1400 audit(1719907131.054:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.277660 kernel: audit: type=1400 audit(1719907131.054:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.277774 kernel: audit: type=1400 audit(1719907131.055:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit: BPF prog-id=110 op=LOAD Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2817 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383461383761376335303865363362333365333831636135393337 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2817 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383461383761376335303865363362333365333831636135393337 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.055000 audit: BPF prog-id=111 op=LOAD Jul 2 07:58:51.055000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ddd60 items=0 ppid=2817 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383461383761376335303865363362333365333831636135393337 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.081000 audit: BPF prog-id=112 op=LOAD Jul 2 07:58:51.081000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ddda8 items=0 ppid=2817 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383461383761376335303865363362333365333831636135393337 Jul 2 07:58:51.102000 audit: BPF prog-id=112 op=UNLOAD Jul 2 07:58:51.102000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:51.102000 audit: BPF prog-id=113 op=LOAD Jul 2 07:58:51.102000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b81b8 items=0 ppid=2817 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383461383761376335303865363362333365333831636135393337 Jul 2 07:58:51.228000 audit[2891]: AVC avc: denied { search } for pid=2891 comm="rpcbind" name="crypto" dev="proc" ino=22699 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:51.228000 audit[2891]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f402862b0c0 a2=0 a3=0 items=0 ppid=2874 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 key=(null) Jul 2 07:58:51.228000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 07:58:51.299000 audit[2896]: AVC avc: denied { search } for pid=2896 comm="dbus-daemon" name="crypto" dev="proc" ino=22699 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:51.299000 audit[2896]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fced7ab00c0 a2=0 a3=0 items=0 ppid=2874 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 key=(null) Jul 2 07:58:51.299000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:58:51.303000 audit[2897]: AVC avc: denied { watch } for pid=2897 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c427,c720 tclass=dir permissive=0 Jul 2 07:58:51.303000 audit[2897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5645c0db1590 a2=2c8 a3=7ffee767fe5c items=0 ppid=2874 pid=2897 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 key=(null) Jul 2 07:58:51.303000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 07:58:51.310000 audit[2898]: AVC avc: denied { read } for pid=2898 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21492 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 07:58:51.310000 audit[2898]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fea708f6320 a1=80000 a2=d a3=7ffd4f280cd0 items=0 ppid=2874 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 key=(null) Jul 2 07:58:51.310000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:58:51.314000 audit[2898]: AVC avc: denied { search } for pid=2898 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22699 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 07:58:51.314000 audit[2898]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fea6fe4a0c0 a2=0 a3=0 items=0 ppid=2874 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c720 key=(null) Jul 2 07:58:51.314000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 07:58:51.316000 audit[2900]: NETFILTER_CFG table=filter:80 family=2 entries=22 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:51.316000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcc9823560 a2=0 a3=7ffcc982354c items=0 ppid=1780 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:51.320000 audit[2900]: NETFILTER_CFG table=nat:81 family=2 entries=104 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:51.320000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffcc9823560 a2=0 a3=7ffcc982354c items=0 ppid=1780 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:51.976271 kubelet[1550]: E0702 07:58:51.976207 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:52.717000 audit[2922]: NETFILTER_CFG table=filter:82 family=2 entries=9 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:52.717000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc6eef5820 a2=0 a3=7ffc6eef580c items=0 ppid=1780 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:52.719000 audit[2922]: NETFILTER_CFG table=nat:83 family=2 entries=51 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:52.719000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffc6eef5820 a2=0 a3=7ffc6eef580c items=0 ppid=1780 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:52.976525 kubelet[1550]: E0702 07:58:52.976356 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:53.977485 kubelet[1550]: E0702 07:58:53.977419 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:54.978602 kubelet[1550]: E0702 07:58:54.978541 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:55.979440 kubelet[1550]: E0702 07:58:55.979365 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:56.980582 kubelet[1550]: E0702 07:58:56.980521 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:57.981000 kubelet[1550]: E0702 07:58:57.980940 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:58.981750 kubelet[1550]: E0702 07:58:58.981684 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:58:59.982612 kubelet[1550]: E0702 07:58:59.982550 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:00.983088 kubelet[1550]: E0702 07:59:00.983024 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:01.065798 kubelet[1550]: I0702 07:59:01.065709 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=10.946497864 podStartE2EDuration="16.065685861s" podCreationTimestamp="2024-07-02 07:58:45 +0000 UTC" firstStartedPulling="2024-07-02 07:58:45.858456123 +0000 UTC m=+41.399013635" lastFinishedPulling="2024-07-02 07:58:50.977644113 +0000 UTC m=+46.518201632" observedRunningTime="2024-07-02 07:58:51.298031991 +0000 UTC m=+46.838589511" watchObservedRunningTime="2024-07-02 07:59:01.065685861 +0000 UTC m=+56.606243360" Jul 2 07:59:01.066334 kubelet[1550]: I0702 07:59:01.066293 1550 topology_manager.go:215] "Topology Admit Handler" podUID="b1058b09-34d5-4ed4-8201-c11497ef9246" podNamespace="default" podName="test-pod-1" Jul 2 07:59:01.073174 systemd[1]: Created slice kubepods-besteffort-podb1058b09_34d5_4ed4_8201_c11497ef9246.slice. Jul 2 07:59:01.202211 kubelet[1550]: I0702 07:59:01.202136 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a12c0546-dad1-4a0c-9ef1-731620da9bee\" (UniqueName: \"kubernetes.io/nfs/b1058b09-34d5-4ed4-8201-c11497ef9246-pvc-a12c0546-dad1-4a0c-9ef1-731620da9bee\") pod \"test-pod-1\" (UID: \"b1058b09-34d5-4ed4-8201-c11497ef9246\") " pod="default/test-pod-1" Jul 2 07:59:01.202211 kubelet[1550]: I0702 07:59:01.202209 1550 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bzx46\" (UniqueName: \"kubernetes.io/projected/b1058b09-34d5-4ed4-8201-c11497ef9246-kube-api-access-bzx46\") pod \"test-pod-1\" (UID: \"b1058b09-34d5-4ed4-8201-c11497ef9246\") " pod="default/test-pod-1" Jul 2 07:59:01.341988 kernel: Failed to create system directory netfs Jul 2 07:59:01.342166 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 2 07:59:01.342219 kernel: audit: type=1400 audit(1719907141.329:705): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.342265 kernel: Failed to create system directory netfs Jul 2 07:59:01.329000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.370037 kernel: audit: type=1400 audit(1719907141.329:705): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.370159 kernel: Failed to create system directory netfs Jul 2 07:59:01.329000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.398114 kernel: audit: type=1400 audit(1719907141.329:705): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.398232 kernel: Failed to create system directory netfs Jul 2 07:59:01.329000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.449281 kernel: audit: type=1400 audit(1719907141.329:705): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.329000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.329000 audit[2936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5581589dd5e0 a1=153bc a2=5581571702b0 a3=5 items=0 ppid=1056 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.329000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:01.493617 kernel: audit: type=1300 audit(1719907141.329:705): arch=c000003e syscall=175 success=yes exit=0 a0=5581589dd5e0 a1=153bc a2=5581571702b0 a3=5 items=0 ppid=1056 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.493740 kernel: audit: type=1327 audit(1719907141.329:705): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:01.522300 kernel: Failed to create system directory fscache Jul 2 07:59:01.522398 kernel: audit: type=1400 audit(1719907141.463:706): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.522441 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.550383 kernel: audit: type=1400 audit(1719907141.463:706): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.550494 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.578598 kernel: audit: type=1400 audit(1719907141.463:706): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.578726 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.606973 kernel: audit: type=1400 audit(1719907141.463:706): avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.607132 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.617480 kernel: Failed to create system directory fscache Jul 2 07:59:01.617573 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.627938 kernel: Failed to create system directory fscache Jul 2 07:59:01.628016 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.638374 kernel: Failed to create system directory fscache Jul 2 07:59:01.638443 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.648802 kernel: Failed to create system directory fscache Jul 2 07:59:01.648878 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.463000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.659322 kernel: Failed to create system directory fscache Jul 2 07:59:01.463000 audit[2936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558158bf29c0 a1=4c0fc a2=5581571702b0 a3=5 items=0 ppid=1056 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.463000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:01.664148 kernel: FS-Cache: Loaded Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.712884 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.712973 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.719130 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.719179 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.728594 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.728688 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.738799 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.743987 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.744059 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.759296 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.759364 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.759401 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.765127 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.770143 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.779947 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.780010 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.790163 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.790237 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.800382 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.800463 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.810630 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.810737 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.815779 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.825992 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.826068 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.836381 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.836442 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.846587 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.846657 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.856776 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.856829 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.866967 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.867053 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.877259 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.877318 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.887458 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.887523 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.897648 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.897703 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.907861 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.907948 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.918059 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.918169 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.928257 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.928341 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.938465 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.938556 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.948660 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.948746 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.958943 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.959022 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.969140 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.969209 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.979343 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.979428 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.983820 kubelet[1550]: E0702 07:59:01.983779 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:01.984469 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.994647 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.994721 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.004850 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.004977 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.015041 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.015134 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.025252 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.025337 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.035448 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.035534 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.045660 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.045738 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.055852 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.055928 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.066042 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.066136 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.076274 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.076328 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.086531 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.086611 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.096753 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.096833 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.106987 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.107069 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.117167 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.117266 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.127427 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.127508 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.137633 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.137720 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.147823 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.147912 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.158017 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.158121 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.168217 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.168302 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.178417 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.178507 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.188636 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.188718 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.198831 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.198889 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.209022 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.209133 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.219222 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.219345 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.229714 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.229815 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.239917 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.240013 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.250122 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.250218 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.260305 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.260405 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.270508 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.270606 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.280704 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.280787 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.290895 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.290989 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.301081 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.301186 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.306132 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.311293 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.321494 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.321595 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.331702 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.331797 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.341912 kernel: Failed to create system directory sunrpc Jul 2 07:59:02.342007 kernel: Failed to create system directory sunrpc Jul 2 07:59:01.690000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.366745 kernel: RPC: Registered named UNIX socket transport module. Jul 2 07:59:02.366817 kernel: RPC: Registered udp transport module. Jul 2 07:59:02.366868 kernel: RPC: Registered tcp transport module. Jul 2 07:59:02.371494 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 07:59:01.690000 audit[2936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558158c3ead0 a1=1a7f5c a2=5581571702b0 a3=5 items=6 ppid=1056 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:01.690000 audit: CWD cwd="/" Jul 2 07:59:01.690000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PATH item=1 name=(null) inode=22999 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PATH item=2 name=(null) inode=22999 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PATH item=3 name=(null) inode=23000 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PATH item=4 name=(null) inode=22999 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PATH item=5 name=(null) inode=23001 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:59:01.690000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.436747 kernel: Failed to create system directory nfs Jul 2 07:59:02.436862 kernel: Failed to create system directory nfs Jul 2 07:59:02.436905 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.446509 kernel: Failed to create system directory nfs Jul 2 07:59:02.446622 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.456126 kernel: Failed to create system directory nfs Jul 2 07:59:02.456222 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.465782 kernel: Failed to create system directory nfs Jul 2 07:59:02.465872 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.475454 kernel: Failed to create system directory nfs Jul 2 07:59:02.475508 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.485157 kernel: Failed to create system directory nfs Jul 2 07:59:02.485235 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.494816 kernel: Failed to create system directory nfs Jul 2 07:59:02.494869 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.504488 kernel: Failed to create system directory nfs Jul 2 07:59:02.504581 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.514201 kernel: Failed to create system directory nfs Jul 2 07:59:02.514289 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.523931 kernel: Failed to create system directory nfs Jul 2 07:59:02.524036 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.533622 kernel: Failed to create system directory nfs Jul 2 07:59:02.533720 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.543530 kernel: Failed to create system directory nfs Jul 2 07:59:02.543626 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.553233 kernel: Failed to create system directory nfs Jul 2 07:59:02.553348 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.562906 kernel: Failed to create system directory nfs Jul 2 07:59:02.563014 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.572674 kernel: Failed to create system directory nfs Jul 2 07:59:02.572770 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.582353 kernel: Failed to create system directory nfs Jul 2 07:59:02.582439 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.587202 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.596905 kernel: Failed to create system directory nfs Jul 2 07:59:02.597014 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.606708 kernel: Failed to create system directory nfs Jul 2 07:59:02.606816 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.616383 kernel: Failed to create system directory nfs Jul 2 07:59:02.616470 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.626088 kernel: Failed to create system directory nfs Jul 2 07:59:02.626225 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.635760 kernel: Failed to create system directory nfs Jul 2 07:59:02.635872 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.645446 kernel: Failed to create system directory nfs Jul 2 07:59:02.645529 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.655139 kernel: Failed to create system directory nfs Jul 2 07:59:02.655221 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.664800 kernel: Failed to create system directory nfs Jul 2 07:59:02.664854 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.674473 kernel: Failed to create system directory nfs Jul 2 07:59:02.674578 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.684178 kernel: Failed to create system directory nfs Jul 2 07:59:02.684274 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.693834 kernel: Failed to create system directory nfs Jul 2 07:59:02.693925 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.703522 kernel: Failed to create system directory nfs Jul 2 07:59:02.703618 kernel: Failed to create system directory nfs Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.416000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.713230 kernel: Failed to create system directory nfs Jul 2 07:59:02.741330 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 07:59:02.416000 audit[2936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558158e5f790 a1=16dba4 a2=5581571702b0 a3=5 items=0 ppid=1056 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:02.416000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.801497 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.801614 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.801653 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.811404 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.816648 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.821943 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.831841 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.835449 systemd[1]: run-containerd-runc-k8s.io-c00b7ced7644ece2ed0b32922f252adfc0e8c30225bfcf78b3e45f6e3995459d-runc.QuhdDO.mount: Deactivated successfully. Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.844125 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.854476 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.854575 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.859778 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.870348 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.870430 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.875581 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.875674 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.881038 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.890781 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.895823 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.900842 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.905909 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.906009 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.915956 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.921031 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.921138 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.930890 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.930966 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.940751 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.940839 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.950597 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.950666 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.960528 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.960614 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.965411 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.970416 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.980217 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.980281 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.984703 kubelet[1550]: E0702 07:59:02.984623 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:02.985258 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.995043 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.995128 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.004907 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.005000 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.014692 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.014764 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.024602 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.024683 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.034450 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.034519 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.044261 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.044337 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.054161 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.054255 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.064002 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.064092 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.073849 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.073903 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.083704 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.083801 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.089187 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.098565 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.098649 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.103553 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.109179 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.118335 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.118413 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.128211 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.128291 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.138150 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.138216 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.147993 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.148066 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.157870 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.157945 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.167718 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.167791 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.177566 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.177641 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.187493 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.187557 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.197286 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.197346 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.207151 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.207211 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.217023 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.217082 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.226849 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.226925 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.236789 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.236870 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.246661 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.246735 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.256586 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.256698 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.266418 kernel: Failed to create system directory nfs4 Jul 2 07:59:03.266498 kernel: Failed to create system directory nfs4 Jul 2 07:59:02.777000 audit[2941]: AVC avc: denied { confidentiality } for pid=2941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.446055 kernel: NFS: Registering the id_resolver key type Jul 2 07:59:03.446287 kernel: Key type id_resolver registered Jul 2 07:59:03.446330 kernel: Key type id_legacy registered Jul 2 07:59:02.777000 audit[2941]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fbb5af4f010 a1=20890c a2=55b6e0a4d2b0 a3=5 items=0 ppid=1056 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:02.777000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.476967 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.477070 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.487387 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.487494 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.487533 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.497770 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.497836 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.507974 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.508036 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.518170 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.518253 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.528408 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.528492 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.538601 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.538682 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.548795 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.548893 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.558994 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.559091 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.569214 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.569303 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.579409 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.579489 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.589607 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.589687 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.462000 audit[2961]: AVC avc: denied { confidentiality } for pid=2961 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:59:03.599820 kernel: Failed to create system directory rpcgss Jul 2 07:59:03.462000 audit[2961]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff69af66010 a1=70bec a2=562a4b94f2b0 a3=5 items=0 ppid=1056 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.462000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 07:59:03.629357 nfsidmap[2968]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Jul 2 07:59:03.639021 nfsidmap[2969]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Jul 2 07:59:03.653000 audit[1361]: AVC avc: denied { watch_reads } for pid=1361 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.653000 audit[1361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55be70e90b60 a2=10 a3=4c671961e1d02526 items=0 ppid=1 pid=1361 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:03.653000 audit[1361]: AVC avc: denied { watch_reads } for pid=1361 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.653000 audit[1361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55be70e90b60 a2=10 a3=4c671961e1d02526 items=0 ppid=1 pid=1361 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:03.653000 audit[1361]: AVC avc: denied { watch_reads } for pid=1361 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.653000 audit[1361]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55be70e90b60 a2=10 a3=4c671961e1d02526 items=0 ppid=1 pid=1361 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:59:03.654000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.654000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.654000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:59:03.778331 env[1217]: time="2024-07-02T07:59:03.777769501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b1058b09-34d5-4ed4-8201-c11497ef9246,Namespace:default,Attempt:0,}" Jul 2 07:59:03.921297 systemd-networkd[1023]: cali5ec59c6bf6e: Link UP Jul 2 07:59:03.928205 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:59:03.937199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 07:59:03.940350 systemd-networkd[1023]: cali5ec59c6bf6e: Gained carrier Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.842 [INFO][2970] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.13-k8s-test--pod--1-eth0 default b1058b09-34d5-4ed4-8201-c11497ef9246 1159 0 2024-07-02 07:58:45 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.842 [INFO][2970] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.873 [INFO][2981] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" HandleID="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Workload="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.883 [INFO][2981] ipam_plugin.go 264: Auto assigning IP ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" HandleID="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Workload="10.128.0.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a120), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.13", "pod":"test-pod-1", "timestamp":"2024-07-02 07:59:03.873944734 +0000 UTC"}, Hostname:"10.128.0.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.883 [INFO][2981] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.883 [INFO][2981] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.884 [INFO][2981] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.13' Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.885 [INFO][2981] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.889 [INFO][2981] ipam.go 372: Looking up existing affinities for host host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.895 [INFO][2981] ipam.go 489: Trying affinity for 192.168.34.64/26 host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.897 [INFO][2981] ipam.go 155: Attempting to load block cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.900 [INFO][2981] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.64/26 host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.900 [INFO][2981] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.64/26 handle="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.904 [INFO][2981] ipam.go 1685: Creating new handle: k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5 Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.909 [INFO][2981] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.64/26 handle="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.915 [INFO][2981] ipam.go 1216: Successfully claimed IPs: [192.168.34.68/26] block=192.168.34.64/26 handle="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.915 [INFO][2981] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.68/26] handle="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" host="10.128.0.13" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.915 [INFO][2981] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.915 [INFO][2981] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.34.68/26] IPv6=[] ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" HandleID="k8s-pod-network.a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Workload="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.917 [INFO][2970] k8s.go 386: Populated endpoint ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b1058b09-34d5-4ed4-8201-c11497ef9246", ResourceVersion:"1159", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 45, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:03.947639 env[1217]: 2024-07-02 07:59:03.917 [INFO][2970] k8s.go 387: Calico CNI using IPs: [192.168.34.68/32] ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.949044 env[1217]: 2024-07-02 07:59:03.917 [INFO][2970] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.949044 env[1217]: 2024-07-02 07:59:03.938 [INFO][2970] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.949044 env[1217]: 2024-07-02 07:59:03.939 [INFO][2970] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b1058b09-34d5-4ed4-8201-c11497ef9246", ResourceVersion:"1159", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 45, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"4a:a2:c8:6a:2e:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:03.949044 env[1217]: 2024-07-02 07:59:03.945 [INFO][2970] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.13-k8s-test--pod--1-eth0" Jul 2 07:59:03.972169 env[1217]: time="2024-07-02T07:59:03.971944735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:59:03.972169 env[1217]: time="2024-07-02T07:59:03.971995143Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:59:03.972169 env[1217]: time="2024-07-02T07:59:03.972014477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:59:03.972744 env[1217]: time="2024-07-02T07:59:03.972536560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5 pid=3009 runtime=io.containerd.runc.v2 Jul 2 07:59:03.971000 audit[3008]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:59:03.971000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe28eb9f00 a2=0 a3=7ffe28eb9eec items=0 ppid=2185 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:59:03.985392 kubelet[1550]: E0702 07:59:03.985310 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:04.004552 systemd[1]: run-containerd-runc-k8s.io-a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5-runc.MdD3m1.mount: Deactivated successfully. Jul 2 07:59:04.011346 systemd[1]: Started cri-containerd-a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5.scope. Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.030000 audit: BPF prog-id=114 op=LOAD Jul 2 07:59:04.033000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.033000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3009 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323634353765343965613031356638616161346237343233356362 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3009 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323634353765343965613031356638616161346237343233356362 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.034000 audit: BPF prog-id=115 op=LOAD Jul 2 07:59:04.034000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000179f50 items=0 ppid=3009 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323634353765343965613031356638616161346237343233356362 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.035000 audit: BPF prog-id=116 op=LOAD Jul 2 07:59:04.035000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000179f98 items=0 ppid=3009 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323634353765343965613031356638616161346237343233356362 Jul 2 07:59:04.037000 audit: BPF prog-id=116 op=UNLOAD Jul 2 07:59:04.037000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.037000 audit: BPF prog-id=117 op=LOAD Jul 2 07:59:04.037000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003703a8 items=0 ppid=3009 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323634353765343965613031356638616161346237343233356362 Jul 2 07:59:04.076822 env[1217]: time="2024-07-02T07:59:04.076771009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b1058b09-34d5-4ed4-8201-c11497ef9246,Namespace:default,Attempt:0,} returns sandbox id \"a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5\"" Jul 2 07:59:04.079062 env[1217]: time="2024-07-02T07:59:04.079018974Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:59:04.311983 env[1217]: time="2024-07-02T07:59:04.311924827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:04.315685 env[1217]: time="2024-07-02T07:59:04.315649031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:04.317837 env[1217]: time="2024-07-02T07:59:04.317798048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:04.320320 env[1217]: time="2024-07-02T07:59:04.320270444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:59:04.321312 env[1217]: time="2024-07-02T07:59:04.321268523Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:59:04.326853 env[1217]: time="2024-07-02T07:59:04.326816590Z" level=info msg="CreateContainer within sandbox \"a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 07:59:04.346931 env[1217]: time="2024-07-02T07:59:04.346004358Z" level=info msg="CreateContainer within sandbox \"a926457e49ea015f8aaa4b74235cbb45d1319f75bdbb914b61050a044ba1cba5\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"199026781ca777fb8f861072ab7bb061e70b6248a2f1dc6f15e402a17889eb49\"" Jul 2 07:59:04.347048 env[1217]: time="2024-07-02T07:59:04.346917148Z" level=info msg="StartContainer for \"199026781ca777fb8f861072ab7bb061e70b6248a2f1dc6f15e402a17889eb49\"" Jul 2 07:59:04.370877 systemd[1]: Started cri-containerd-199026781ca777fb8f861072ab7bb061e70b6248a2f1dc6f15e402a17889eb49.scope. Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.389000 audit: BPF prog-id=118 op=LOAD Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3009 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393032363738316361373737666238663836313037326162376262 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3009 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393032363738316361373737666238663836313037326162376262 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit: BPF prog-id=119 op=LOAD Jul 2 07:59:04.391000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003cef20 items=0 ppid=3009 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393032363738316361373737666238663836313037326162376262 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit: BPF prog-id=120 op=LOAD Jul 2 07:59:04.391000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003cef68 items=0 ppid=3009 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393032363738316361373737666238663836313037326162376262 Jul 2 07:59:04.391000 audit: BPF prog-id=120 op=UNLOAD Jul 2 07:59:04.391000 audit: BPF prog-id=119 op=UNLOAD Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:59:04.391000 audit: BPF prog-id=121 op=LOAD Jul 2 07:59:04.391000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003cf378 items=0 ppid=3009 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:04.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393032363738316361373737666238663836313037326162376262 Jul 2 07:59:04.415962 env[1217]: time="2024-07-02T07:59:04.414048218Z" level=info msg="StartContainer for \"199026781ca777fb8f861072ab7bb061e70b6248a2f1dc6f15e402a17889eb49\" returns successfully" Jul 2 07:59:04.930404 kubelet[1550]: E0702 07:59:04.930341 1550 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:04.958632 env[1217]: time="2024-07-02T07:59:04.958578252Z" level=info msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" Jul 2 07:59:04.985777 kubelet[1550]: E0702 07:59:04.985709 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.012 [WARNING][3111] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-csi--node--driver--zkzp9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ac96d4-c8f8-431e-ba50-ef7161db58b4", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066", Pod:"csi-node-driver-zkzp9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif86b0673573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.013 [INFO][3111] k8s.go 608: Cleaning up netns ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.013 [INFO][3111] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" iface="eth0" netns="" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.013 [INFO][3111] k8s.go 615: Releasing IP address(es) ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.013 [INFO][3111] utils.go 188: Calico CNI releasing IP address ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.038 [INFO][3117] ipam_plugin.go 411: Releasing address using handleID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.038 [INFO][3117] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.038 [INFO][3117] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.045 [WARNING][3117] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.045 [INFO][3117] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.048 [INFO][3117] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:05.050247 env[1217]: 2024-07-02 07:59:05.049 [INFO][3111] k8s.go 621: Teardown processing complete. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.050973 env[1217]: time="2024-07-02T07:59:05.050325535Z" level=info msg="TearDown network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" successfully" Jul 2 07:59:05.050973 env[1217]: time="2024-07-02T07:59:05.050367728Z" level=info msg="StopPodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" returns successfully" Jul 2 07:59:05.052082 env[1217]: time="2024-07-02T07:59:05.052042532Z" level=info msg="RemovePodSandbox for \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" Jul 2 07:59:05.052344 env[1217]: time="2024-07-02T07:59:05.052275000Z" level=info msg="Forcibly stopping sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\"" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.097 [WARNING][3136] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-csi--node--driver--zkzp9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ac96d4-c8f8-431e-ba50-ef7161db58b4", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"12709d1d2b8c682fc8f69591f824023113df0faa82b40f19097e03b33d414066", Pod:"csi-node-driver-zkzp9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif86b0673573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.097 [INFO][3136] k8s.go 608: Cleaning up netns ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.098 [INFO][3136] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" iface="eth0" netns="" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.098 [INFO][3136] k8s.go 615: Releasing IP address(es) ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.098 [INFO][3136] utils.go 188: Calico CNI releasing IP address ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.137 [INFO][3142] ipam_plugin.go 411: Releasing address using handleID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.137 [INFO][3142] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.137 [INFO][3142] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.144 [WARNING][3142] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.144 [INFO][3142] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" HandleID="k8s-pod-network.0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Workload="10.128.0.13-k8s-csi--node--driver--zkzp9-eth0" Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.146 [INFO][3142] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:05.148387 env[1217]: 2024-07-02 07:59:05.147 [INFO][3136] k8s.go 621: Teardown processing complete. ContainerID="0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87" Jul 2 07:59:05.149248 env[1217]: time="2024-07-02T07:59:05.148420411Z" level=info msg="TearDown network for sandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" successfully" Jul 2 07:59:05.153979 env[1217]: time="2024-07-02T07:59:05.153934937Z" level=info msg="RemovePodSandbox \"0dad624fac2f4138be23d9e37b9a9fa22fb78a97dfa4f0f3fb7ce53433a60d87\" returns successfully" Jul 2 07:59:05.154639 env[1217]: time="2024-07-02T07:59:05.154591759Z" level=info msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.196 [WARNING][3162] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"96966ba9-5f4e-4230-8a9b-49dc8d84c344", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79", Pod:"nginx-deployment-85f456d6dd-47dq7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid0394ccaf7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.196 [INFO][3162] k8s.go 608: Cleaning up netns ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.196 [INFO][3162] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" iface="eth0" netns="" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.196 [INFO][3162] k8s.go 615: Releasing IP address(es) ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.197 [INFO][3162] utils.go 188: Calico CNI releasing IP address ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.222 [INFO][3168] ipam_plugin.go 411: Releasing address using handleID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.222 [INFO][3168] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.222 [INFO][3168] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.231 [WARNING][3168] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.231 [INFO][3168] ipam_plugin.go 439: Releasing address using workloadID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.233 [INFO][3168] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:05.237707 env[1217]: 2024-07-02 07:59:05.234 [INFO][3162] k8s.go 621: Teardown processing complete. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.237707 env[1217]: time="2024-07-02T07:59:05.235975224Z" level=info msg="TearDown network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" successfully" Jul 2 07:59:05.237707 env[1217]: time="2024-07-02T07:59:05.236022986Z" level=info msg="StopPodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" returns successfully" Jul 2 07:59:05.237707 env[1217]: time="2024-07-02T07:59:05.237130262Z" level=info msg="RemovePodSandbox for \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" Jul 2 07:59:05.237707 env[1217]: time="2024-07-02T07:59:05.237179581Z" level=info msg="Forcibly stopping sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\"" Jul 2 07:59:05.333950 kubelet[1550]: I0702 07:59:05.333782 1550 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.0882984 podStartE2EDuration="20.333761123s" podCreationTimestamp="2024-07-02 07:58:45 +0000 UTC" firstStartedPulling="2024-07-02 07:59:04.078551094 +0000 UTC m=+59.619108592" lastFinishedPulling="2024-07-02 07:59:04.324013799 +0000 UTC m=+59.864571315" observedRunningTime="2024-07-02 07:59:05.332990605 +0000 UTC m=+60.873548125" watchObservedRunningTime="2024-07-02 07:59:05.333761123 +0000 UTC m=+60.874318644" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.299 [WARNING][3186] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"96966ba9-5f4e-4230-8a9b-49dc8d84c344", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.13", ContainerID:"be2fcfbf3ba4e4c531ef2cccbb3a65bf42018c9e846fb0b95751cdfb3cfa0e79", Pod:"nginx-deployment-85f456d6dd-47dq7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid0394ccaf7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.299 [INFO][3186] k8s.go 608: Cleaning up netns ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.299 [INFO][3186] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" iface="eth0" netns="" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.300 [INFO][3186] k8s.go 615: Releasing IP address(es) ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.300 [INFO][3186] utils.go 188: Calico CNI releasing IP address ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.329 [INFO][3192] ipam_plugin.go 411: Releasing address using handleID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.329 [INFO][3192] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.329 [INFO][3192] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.338 [WARNING][3192] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.338 [INFO][3192] ipam_plugin.go 439: Releasing address using workloadID ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" HandleID="k8s-pod-network.414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Workload="10.128.0.13-k8s-nginx--deployment--85f456d6dd--47dq7-eth0" Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.339 [INFO][3192] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:59:05.341896 env[1217]: 2024-07-02 07:59:05.340 [INFO][3186] k8s.go 621: Teardown processing complete. ContainerID="414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a" Jul 2 07:59:05.342766 env[1217]: time="2024-07-02T07:59:05.341994482Z" level=info msg="TearDown network for sandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" successfully" Jul 2 07:59:05.346089 env[1217]: time="2024-07-02T07:59:05.346037681Z" level=info msg="RemovePodSandbox \"414dca0a59d986bb955bbd2c5be46888a693d76e258e25ee585243aef236683a\" returns successfully" Jul 2 07:59:05.661000 audit[3205]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:05.661000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2a744f20 a2=0 a3=7ffe2a744f0c items=0 ppid=1780 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:05.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:05.664000 audit[3205]: NETFILTER_CFG table=nat:86 family=2 entries=58 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:05.664000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffe2a744f20 a2=0 a3=7ffe2a744f0c items=0 ppid=1780 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:05.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:05.709357 systemd-networkd[1023]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 07:59:05.986468 kubelet[1550]: E0702 07:59:05.986324 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:06.987567 kubelet[1550]: E0702 07:59:06.987498 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:07.987850 kubelet[1550]: E0702 07:59:07.987791 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:08.988320 kubelet[1550]: E0702 07:59:08.988253 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:09.988956 kubelet[1550]: E0702 07:59:09.988908 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:10.989752 kubelet[1550]: E0702 07:59:10.989683 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:59:11.990501 kubelet[1550]: E0702 07:59:11.990427 1550 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"