Jul 2 08:52:06.011072 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 08:52:06.011111 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:52:06.011133 kernel: BIOS-provided physical RAM map: Jul 2 08:52:06.011185 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 08:52:06.011199 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 08:52:06.011212 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 08:52:06.011227 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Jul 2 08:52:06.011240 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Jul 2 08:52:06.011256 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 08:52:06.011269 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 08:52:06.011282 kernel: NX (Execute Disable) protection: active Jul 2 08:52:06.011294 kernel: SMBIOS 2.8 present. Jul 2 08:52:06.011306 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jul 2 08:52:06.011319 kernel: Hypervisor detected: KVM Jul 2 08:52:06.011334 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 08:52:06.011351 kernel: kvm-clock: cpu 0, msr 15192001, primary cpu clock Jul 2 08:52:06.011364 kernel: kvm-clock: using sched offset of 9279525635 cycles Jul 2 08:52:06.011379 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 08:52:06.011393 kernel: tsc: Detected 1996.249 MHz processor Jul 2 08:52:06.011407 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 08:52:06.011421 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 08:52:06.011435 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Jul 2 08:52:06.011449 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 08:52:06.011466 kernel: ACPI: Early table checksum verification disabled Jul 2 08:52:06.011481 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Jul 2 08:52:06.011495 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:52:06.011509 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:52:06.011522 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:52:06.011536 kernel: ACPI: FACS 0x000000007FFE0000 000040 Jul 2 08:52:06.011550 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:52:06.011564 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:52:06.011578 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Jul 2 08:52:06.011594 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Jul 2 08:52:06.011608 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Jul 2 08:52:06.011621 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Jul 2 08:52:06.011635 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Jul 2 08:52:06.011648 kernel: No NUMA configuration found Jul 2 08:52:06.011662 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Jul 2 08:52:06.011676 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Jul 2 08:52:06.011689 kernel: Zone ranges: Jul 2 08:52:06.011712 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 08:52:06.011726 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Jul 2 08:52:06.011740 kernel: Normal empty Jul 2 08:52:06.011755 kernel: Movable zone start for each node Jul 2 08:52:06.011769 kernel: Early memory node ranges Jul 2 08:52:06.011783 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 08:52:06.011800 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Jul 2 08:52:06.011814 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Jul 2 08:52:06.011828 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 08:52:06.011843 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 08:52:06.011857 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Jul 2 08:52:06.011871 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 08:52:06.011885 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 08:52:06.011899 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 08:52:06.011913 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 08:52:06.011930 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 08:52:06.011944 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 08:52:06.011958 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 08:52:06.011973 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 08:52:06.011987 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 08:52:06.012001 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 08:52:06.012015 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Jul 2 08:52:06.012030 kernel: Booting paravirtualized kernel on KVM Jul 2 08:52:06.012045 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 08:52:06.012060 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 08:52:06.012077 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 08:52:06.012091 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 08:52:06.012105 kernel: pcpu-alloc: [0] 0 1 Jul 2 08:52:06.012119 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Jul 2 08:52:06.012134 kernel: kvm-guest: PV spinlocks disabled, no host support Jul 2 08:52:06.014214 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Jul 2 08:52:06.014240 kernel: Policy zone: DMA32 Jul 2 08:52:06.014258 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:52:06.014280 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 08:52:06.014295 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 08:52:06.014310 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 08:52:06.014324 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 08:52:06.014340 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123076K reserved, 0K cma-reserved) Jul 2 08:52:06.014354 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 08:52:06.014368 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 08:52:06.014383 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 08:52:06.014399 kernel: rcu: Hierarchical RCU implementation. Jul 2 08:52:06.014415 kernel: rcu: RCU event tracing is enabled. Jul 2 08:52:06.014429 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 08:52:06.014444 kernel: Rude variant of Tasks RCU enabled. Jul 2 08:52:06.014458 kernel: Tracing variant of Tasks RCU enabled. Jul 2 08:52:06.014473 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 08:52:06.014487 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 08:52:06.014502 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 08:52:06.014516 kernel: Console: colour VGA+ 80x25 Jul 2 08:52:06.014532 kernel: printk: console [tty0] enabled Jul 2 08:52:06.014547 kernel: printk: console [ttyS0] enabled Jul 2 08:52:06.014561 kernel: ACPI: Core revision 20210730 Jul 2 08:52:06.014575 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 08:52:06.014589 kernel: x2apic enabled Jul 2 08:52:06.014604 kernel: Switched APIC routing to physical x2apic. Jul 2 08:52:06.014618 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 08:52:06.014632 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 2 08:52:06.014646 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Jul 2 08:52:06.014661 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 2 08:52:06.014678 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 2 08:52:06.014693 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 08:52:06.014707 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 08:52:06.014721 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 08:52:06.014735 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 08:52:06.014750 kernel: Speculative Store Bypass: Vulnerable Jul 2 08:52:06.014764 kernel: x86/fpu: x87 FPU will use FXSAVE Jul 2 08:52:06.014778 kernel: Freeing SMP alternatives memory: 32K Jul 2 08:52:06.014792 kernel: pid_max: default: 32768 minimum: 301 Jul 2 08:52:06.014810 kernel: LSM: Security Framework initializing Jul 2 08:52:06.014824 kernel: SELinux: Initializing. Jul 2 08:52:06.014838 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 08:52:06.014852 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 08:52:06.014874 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Jul 2 08:52:06.014895 kernel: Performance Events: AMD PMU driver. Jul 2 08:52:06.014910 kernel: ... version: 0 Jul 2 08:52:06.014924 kernel: ... bit width: 48 Jul 2 08:52:06.014939 kernel: ... generic registers: 4 Jul 2 08:52:06.014967 kernel: ... value mask: 0000ffffffffffff Jul 2 08:52:06.014982 kernel: ... max period: 00007fffffffffff Jul 2 08:52:06.015001 kernel: ... fixed-purpose events: 0 Jul 2 08:52:06.015015 kernel: ... event mask: 000000000000000f Jul 2 08:52:06.015030 kernel: signal: max sigframe size: 1440 Jul 2 08:52:06.015045 kernel: rcu: Hierarchical SRCU implementation. Jul 2 08:52:06.015059 kernel: smp: Bringing up secondary CPUs ... Jul 2 08:52:06.015074 kernel: x86: Booting SMP configuration: Jul 2 08:52:06.015091 kernel: .... node #0, CPUs: #1 Jul 2 08:52:06.015106 kernel: kvm-clock: cpu 1, msr 15192041, secondary cpu clock Jul 2 08:52:06.015121 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Jul 2 08:52:06.015136 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 08:52:06.015177 kernel: smpboot: Max logical packages: 2 Jul 2 08:52:06.015192 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Jul 2 08:52:06.015207 kernel: devtmpfs: initialized Jul 2 08:52:06.015222 kernel: x86/mm: Memory block size: 128MB Jul 2 08:52:06.015237 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 08:52:06.015257 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 08:52:06.015274 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 08:52:06.015296 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 08:52:06.015318 kernel: audit: initializing netlink subsys (disabled) Jul 2 08:52:06.015335 kernel: audit: type=2000 audit(1719910325.409:1): state=initialized audit_enabled=0 res=1 Jul 2 08:52:06.015350 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 08:52:06.015364 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 08:52:06.015379 kernel: cpuidle: using governor menu Jul 2 08:52:06.015394 kernel: ACPI: bus type PCI registered Jul 2 08:52:06.015414 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 08:52:06.015429 kernel: dca service started, version 1.12.1 Jul 2 08:52:06.015444 kernel: PCI: Using configuration type 1 for base access Jul 2 08:52:06.015460 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 08:52:06.015482 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 08:52:06.015497 kernel: ACPI: Added _OSI(Module Device) Jul 2 08:52:06.015516 kernel: ACPI: Added _OSI(Processor Device) Jul 2 08:52:06.015537 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 08:52:06.015560 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 08:52:06.015583 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 08:52:06.015598 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 08:52:06.015612 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 08:52:06.015627 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 08:52:06.015642 kernel: ACPI: Interpreter enabled Jul 2 08:52:06.015657 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 08:52:06.015671 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 08:52:06.015692 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 08:52:06.015710 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 08:52:06.015731 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 08:52:06.015963 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 08:52:06.016120 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 08:52:06.016144 kernel: acpiphp: Slot [3] registered Jul 2 08:52:06.016189 kernel: acpiphp: Slot [4] registered Jul 2 08:52:06.016204 kernel: acpiphp: Slot [5] registered Jul 2 08:52:06.016219 kernel: acpiphp: Slot [6] registered Jul 2 08:52:06.016241 kernel: acpiphp: Slot [7] registered Jul 2 08:52:06.016256 kernel: acpiphp: Slot [8] registered Jul 2 08:52:06.016270 kernel: acpiphp: Slot [9] registered Jul 2 08:52:06.016285 kernel: acpiphp: Slot [10] registered Jul 2 08:52:06.016300 kernel: acpiphp: Slot [11] registered Jul 2 08:52:06.016315 kernel: acpiphp: Slot [12] registered Jul 2 08:52:06.016330 kernel: acpiphp: Slot [13] registered Jul 2 08:52:06.016345 kernel: acpiphp: Slot [14] registered Jul 2 08:52:06.016359 kernel: acpiphp: Slot [15] registered Jul 2 08:52:06.016374 kernel: acpiphp: Slot [16] registered Jul 2 08:52:06.016392 kernel: acpiphp: Slot [17] registered Jul 2 08:52:06.016406 kernel: acpiphp: Slot [18] registered Jul 2 08:52:06.016421 kernel: acpiphp: Slot [19] registered Jul 2 08:52:06.016436 kernel: acpiphp: Slot [20] registered Jul 2 08:52:06.016450 kernel: acpiphp: Slot [21] registered Jul 2 08:52:06.016465 kernel: acpiphp: Slot [22] registered Jul 2 08:52:06.016480 kernel: acpiphp: Slot [23] registered Jul 2 08:52:06.016494 kernel: acpiphp: Slot [24] registered Jul 2 08:52:06.016509 kernel: acpiphp: Slot [25] registered Jul 2 08:52:06.016527 kernel: acpiphp: Slot [26] registered Jul 2 08:52:06.016548 kernel: acpiphp: Slot [27] registered Jul 2 08:52:06.016568 kernel: acpiphp: Slot [28] registered Jul 2 08:52:06.016583 kernel: acpiphp: Slot [29] registered Jul 2 08:52:06.016598 kernel: acpiphp: Slot [30] registered Jul 2 08:52:06.016613 kernel: acpiphp: Slot [31] registered Jul 2 08:52:06.016628 kernel: PCI host bridge to bus 0000:00 Jul 2 08:52:06.016829 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 08:52:06.016972 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 08:52:06.017113 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 08:52:06.017283 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 08:52:06.017420 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jul 2 08:52:06.017557 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 08:52:06.017766 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 08:52:06.017939 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 08:52:06.018116 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 08:52:06.023356 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Jul 2 08:52:06.023524 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 08:52:06.023678 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 08:52:06.023849 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 08:52:06.024005 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 08:52:06.024242 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 08:52:06.024412 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jul 2 08:52:06.024566 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jul 2 08:52:06.024740 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jul 2 08:52:06.024894 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jul 2 08:52:06.025055 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jul 2 08:52:06.027233 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Jul 2 08:52:06.027335 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Jul 2 08:52:06.027424 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 08:52:06.027534 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 2 08:52:06.027624 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Jul 2 08:52:06.027710 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Jul 2 08:52:06.027799 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jul 2 08:52:06.027886 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Jul 2 08:52:06.027989 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 2 08:52:06.028078 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 08:52:06.028207 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Jul 2 08:52:06.028299 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jul 2 08:52:06.028392 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Jul 2 08:52:06.028474 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Jul 2 08:52:06.028554 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jul 2 08:52:06.028647 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 08:52:06.028729 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Jul 2 08:52:06.028809 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jul 2 08:52:06.028821 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 08:52:06.028833 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 08:52:06.028846 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 08:52:06.028855 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 08:52:06.028863 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 08:52:06.028875 kernel: iommu: Default domain type: Translated Jul 2 08:52:06.028883 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 08:52:06.028966 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 08:52:06.029046 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 08:52:06.029126 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 08:52:06.029138 kernel: vgaarb: loaded Jul 2 08:52:06.033192 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 08:52:06.033206 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 08:52:06.033216 kernel: PTP clock support registered Jul 2 08:52:06.033244 kernel: PCI: Using ACPI for IRQ routing Jul 2 08:52:06.033253 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 08:52:06.033262 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 08:52:06.033271 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Jul 2 08:52:06.033280 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 08:52:06.033288 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 08:52:06.033297 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 08:52:06.033306 kernel: pnp: PnP ACPI init Jul 2 08:52:06.033444 kernel: pnp 00:03: [dma 2] Jul 2 08:52:06.033464 kernel: pnp: PnP ACPI: found 5 devices Jul 2 08:52:06.033473 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 08:52:06.033482 kernel: NET: Registered PF_INET protocol family Jul 2 08:52:06.033491 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 08:52:06.033500 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 08:52:06.033509 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 08:52:06.033517 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 08:52:06.033526 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 08:52:06.033536 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 08:52:06.033545 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 08:52:06.033554 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 08:52:06.033563 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 08:52:06.033572 kernel: NET: Registered PF_XDP protocol family Jul 2 08:52:06.033666 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 08:52:06.033764 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 08:52:06.033845 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 08:52:06.033922 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 08:52:06.034005 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jul 2 08:52:06.034097 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 08:52:06.034233 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 08:52:06.034326 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 08:52:06.034339 kernel: PCI: CLS 0 bytes, default 64 Jul 2 08:52:06.034349 kernel: Initialise system trusted keyrings Jul 2 08:52:06.034362 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 08:52:06.034377 kernel: Key type asymmetric registered Jul 2 08:52:06.034388 kernel: Asymmetric key parser 'x509' registered Jul 2 08:52:06.034402 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 08:52:06.034415 kernel: io scheduler mq-deadline registered Jul 2 08:52:06.034433 kernel: io scheduler kyber registered Jul 2 08:52:06.034441 kernel: io scheduler bfq registered Jul 2 08:52:06.034450 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 08:52:06.034460 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jul 2 08:52:06.034469 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 08:52:06.034477 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 08:52:06.034489 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 08:52:06.034498 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 08:52:06.034507 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 08:52:06.034515 kernel: random: crng init done Jul 2 08:52:06.034524 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 08:52:06.034533 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 08:52:06.034542 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 08:52:06.034551 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 08:52:06.034651 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 2 08:52:06.034738 kernel: rtc_cmos 00:04: registered as rtc0 Jul 2 08:52:06.034833 kernel: rtc_cmos 00:04: setting system clock to 2024-07-02T08:52:05 UTC (1719910325) Jul 2 08:52:06.034916 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jul 2 08:52:06.034935 kernel: NET: Registered PF_INET6 protocol family Jul 2 08:52:06.034948 kernel: Segment Routing with IPv6 Jul 2 08:52:06.034956 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 08:52:06.034965 kernel: NET: Registered PF_PACKET protocol family Jul 2 08:52:06.034973 kernel: Key type dns_resolver registered Jul 2 08:52:06.034985 kernel: IPI shorthand broadcast: enabled Jul 2 08:52:06.034994 kernel: sched_clock: Marking stable (714802398, 119315293)->(862945955, -28828264) Jul 2 08:52:06.035003 kernel: registered taskstats version 1 Jul 2 08:52:06.035014 kernel: Loading compiled-in X.509 certificates Jul 2 08:52:06.035027 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 08:52:06.035038 kernel: Key type .fscrypt registered Jul 2 08:52:06.035046 kernel: Key type fscrypt-provisioning registered Jul 2 08:52:06.035055 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 08:52:06.035066 kernel: ima: Allocated hash algorithm: sha1 Jul 2 08:52:06.035075 kernel: ima: No architecture policies found Jul 2 08:52:06.035084 kernel: clk: Disabling unused clocks Jul 2 08:52:06.035092 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 08:52:06.035101 kernel: Write protecting the kernel read-only data: 28672k Jul 2 08:52:06.035109 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 08:52:06.035118 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 08:52:06.035127 kernel: Run /init as init process Jul 2 08:52:06.035135 kernel: with arguments: Jul 2 08:52:06.035165 kernel: /init Jul 2 08:52:06.035173 kernel: with environment: Jul 2 08:52:06.035182 kernel: HOME=/ Jul 2 08:52:06.035190 kernel: TERM=linux Jul 2 08:52:06.035199 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 08:52:06.035210 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:52:06.035222 systemd[1]: Detected virtualization kvm. Jul 2 08:52:06.035232 systemd[1]: Detected architecture x86-64. Jul 2 08:52:06.035244 systemd[1]: Running in initrd. Jul 2 08:52:06.035253 systemd[1]: No hostname configured, using default hostname. Jul 2 08:52:06.035262 systemd[1]: Hostname set to . Jul 2 08:52:06.035273 systemd[1]: Initializing machine ID from VM UUID. Jul 2 08:52:06.035282 systemd[1]: Queued start job for default target initrd.target. Jul 2 08:52:06.035291 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:52:06.035300 systemd[1]: Reached target cryptsetup.target. Jul 2 08:52:06.035309 systemd[1]: Reached target paths.target. Jul 2 08:52:06.035320 systemd[1]: Reached target slices.target. Jul 2 08:52:06.035330 systemd[1]: Reached target swap.target. Jul 2 08:52:06.035339 systemd[1]: Reached target timers.target. Jul 2 08:52:06.035349 systemd[1]: Listening on iscsid.socket. Jul 2 08:52:06.035358 systemd[1]: Listening on iscsiuio.socket. Jul 2 08:52:06.035367 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 08:52:06.035376 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 08:52:06.035387 systemd[1]: Listening on systemd-journald.socket. Jul 2 08:52:06.035397 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:52:06.035406 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:52:06.035415 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:52:06.035425 systemd[1]: Reached target sockets.target. Jul 2 08:52:06.035446 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:52:06.035457 systemd[1]: Finished network-cleanup.service. Jul 2 08:52:06.035468 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 08:52:06.035478 systemd[1]: Starting systemd-journald.service... Jul 2 08:52:06.035487 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:52:06.035497 systemd[1]: Starting systemd-resolved.service... Jul 2 08:52:06.035507 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 08:52:06.035517 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:52:06.035526 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 08:52:06.035539 systemd-journald[185]: Journal started Jul 2 08:52:06.035588 systemd-journald[185]: Runtime Journal (/run/log/journal/78928fe3ecc0452b9178eb8f939c10a4) is 4.9M, max 39.5M, 34.5M free. Jul 2 08:52:06.005514 systemd-modules-load[186]: Inserted module 'overlay' Jul 2 08:52:06.061929 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 08:52:06.044792 systemd-resolved[187]: Positive Trust Anchors: Jul 2 08:52:06.067003 systemd[1]: Started systemd-journald.service. Jul 2 08:52:06.067023 kernel: audit: type=1130 audit(1719910326.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.044805 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:52:06.072105 kernel: audit: type=1130 audit(1719910326.067:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.072123 kernel: Bridge firewalling registered Jul 2 08:52:06.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.044840 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:52:06.078049 kernel: audit: type=1130 audit(1719910326.072:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.047743 systemd-resolved[187]: Defaulting to hostname 'linux'. Jul 2 08:52:06.082539 kernel: audit: type=1130 audit(1719910326.078:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.067608 systemd[1]: Started systemd-resolved.service. Jul 2 08:52:06.071878 systemd-modules-load[186]: Inserted module 'br_netfilter' Jul 2 08:52:06.072784 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 08:52:06.078698 systemd[1]: Reached target nss-lookup.target. Jul 2 08:52:06.083813 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 08:52:06.085506 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 08:52:06.097801 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 08:52:06.103660 kernel: audit: type=1130 audit(1719910326.098:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.109191 kernel: SCSI subsystem initialized Jul 2 08:52:06.109549 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 08:52:06.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.114930 systemd[1]: Starting dracut-cmdline.service... Jul 2 08:52:06.115493 kernel: audit: type=1130 audit(1719910326.110:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.125330 dracut-cmdline[201]: dracut-dracut-053 Jul 2 08:52:06.127541 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 08:52:06.127561 kernel: device-mapper: uevent: version 1.0.3 Jul 2 08:52:06.127573 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 08:52:06.129669 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:52:06.129772 systemd-modules-load[186]: Inserted module 'dm_multipath' Jul 2 08:52:06.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.130699 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:52:06.138307 kernel: audit: type=1130 audit(1719910326.132:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.136990 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:52:06.145474 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:52:06.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.150171 kernel: audit: type=1130 audit(1719910326.145:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.212250 kernel: Loading iSCSI transport class v2.0-870. Jul 2 08:52:06.233217 kernel: iscsi: registered transport (tcp) Jul 2 08:52:06.260199 kernel: iscsi: registered transport (qla4xxx) Jul 2 08:52:06.260264 kernel: QLogic iSCSI HBA Driver Jul 2 08:52:06.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.313529 systemd[1]: Finished dracut-cmdline.service. Jul 2 08:52:06.318727 kernel: audit: type=1130 audit(1719910326.314:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.316956 systemd[1]: Starting dracut-pre-udev.service... Jul 2 08:52:06.400393 kernel: raid6: sse2x4 gen() 9241 MB/s Jul 2 08:52:06.417376 kernel: raid6: sse2x4 xor() 4801 MB/s Jul 2 08:52:06.434368 kernel: raid6: sse2x2 gen() 13456 MB/s Jul 2 08:52:06.451245 kernel: raid6: sse2x2 xor() 8320 MB/s Jul 2 08:52:06.468318 kernel: raid6: sse2x1 gen() 10431 MB/s Jul 2 08:52:06.486033 kernel: raid6: sse2x1 xor() 6517 MB/s Jul 2 08:52:06.486092 kernel: raid6: using algorithm sse2x2 gen() 13456 MB/s Jul 2 08:52:06.486119 kernel: raid6: .... xor() 8320 MB/s, rmw enabled Jul 2 08:52:06.486944 kernel: raid6: using ssse3x2 recovery algorithm Jul 2 08:52:06.503739 kernel: xor: measuring software checksum speed Jul 2 08:52:06.503804 kernel: prefetch64-sse : 17260 MB/sec Jul 2 08:52:06.505200 kernel: generic_sse : 15719 MB/sec Jul 2 08:52:06.505242 kernel: xor: using function: prefetch64-sse (17260 MB/sec) Jul 2 08:52:06.626241 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 08:52:06.642855 systemd[1]: Finished dracut-pre-udev.service. Jul 2 08:52:06.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.644000 audit: BPF prog-id=7 op=LOAD Jul 2 08:52:06.645000 audit: BPF prog-id=8 op=LOAD Jul 2 08:52:06.646747 systemd[1]: Starting systemd-udevd.service... Jul 2 08:52:06.669011 systemd-udevd[385]: Using default interface naming scheme 'v252'. Jul 2 08:52:06.673857 systemd[1]: Started systemd-udevd.service. Jul 2 08:52:06.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.681302 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 08:52:06.706999 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Jul 2 08:52:06.760544 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 08:52:06.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.762980 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:52:06.826052 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:52:06.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:06.908291 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Jul 2 08:52:06.921517 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 08:52:06.921588 kernel: GPT:17805311 != 41943039 Jul 2 08:52:06.921611 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 08:52:06.921631 kernel: GPT:17805311 != 41943039 Jul 2 08:52:06.921649 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 08:52:06.921668 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:52:06.929518 kernel: libata version 3.00 loaded. Jul 2 08:52:06.933371 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 08:52:06.941170 kernel: scsi host0: ata_piix Jul 2 08:52:06.951171 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (437) Jul 2 08:52:06.954166 kernel: scsi host1: ata_piix Jul 2 08:52:06.954330 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Jul 2 08:52:06.954344 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Jul 2 08:52:06.969261 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:52:07.001469 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 08:52:07.004962 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 08:52:07.005531 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 08:52:07.010572 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 08:52:07.011927 systemd[1]: Starting disk-uuid.service... Jul 2 08:52:07.071612 disk-uuid[461]: Primary Header is updated. Jul 2 08:52:07.071612 disk-uuid[461]: Secondary Entries is updated. Jul 2 08:52:07.071612 disk-uuid[461]: Secondary Header is updated. Jul 2 08:52:07.082205 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:52:07.093217 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:52:08.104499 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:52:08.105272 disk-uuid[462]: The operation has completed successfully. Jul 2 08:52:08.179024 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 08:52:08.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.179288 systemd[1]: Finished disk-uuid.service. Jul 2 08:52:08.190274 systemd[1]: Starting verity-setup.service... Jul 2 08:52:08.212241 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Jul 2 08:52:08.316623 systemd[1]: Found device dev-mapper-usr.device. Jul 2 08:52:08.319187 systemd[1]: Mounting sysusr-usr.mount... Jul 2 08:52:08.322960 systemd[1]: Finished verity-setup.service. Jul 2 08:52:08.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.462223 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 08:52:08.463365 systemd[1]: Mounted sysusr-usr.mount. Jul 2 08:52:08.465020 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 08:52:08.465921 systemd[1]: Starting ignition-setup.service... Jul 2 08:52:08.469241 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 08:52:08.495375 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:52:08.495422 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:52:08.495434 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:52:08.521501 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 08:52:08.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.535670 systemd[1]: Finished ignition-setup.service. Jul 2 08:52:08.537071 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 08:52:08.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.589222 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 08:52:08.592000 audit: BPF prog-id=9 op=LOAD Jul 2 08:52:08.594301 systemd[1]: Starting systemd-networkd.service... Jul 2 08:52:08.642331 systemd-networkd[633]: lo: Link UP Jul 2 08:52:08.642344 systemd-networkd[633]: lo: Gained carrier Jul 2 08:52:08.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.642878 systemd-networkd[633]: Enumeration completed Jul 2 08:52:08.642995 systemd[1]: Started systemd-networkd.service. Jul 2 08:52:08.643329 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:52:08.644628 systemd[1]: Reached target network.target. Jul 2 08:52:08.645439 systemd-networkd[633]: eth0: Link UP Jul 2 08:52:08.645443 systemd-networkd[633]: eth0: Gained carrier Jul 2 08:52:08.646858 systemd[1]: Starting iscsiuio.service... Jul 2 08:52:08.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.655922 systemd[1]: Started iscsiuio.service. Jul 2 08:52:08.657572 systemd[1]: Starting iscsid.service... Jul 2 08:52:08.661011 iscsid[641]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:52:08.661011 iscsid[641]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 08:52:08.661011 iscsid[641]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 08:52:08.661011 iscsid[641]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 08:52:08.661011 iscsid[641]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:52:08.661011 iscsid[641]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 08:52:08.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.662541 systemd[1]: Started iscsid.service. Jul 2 08:52:08.663942 systemd[1]: Starting dracut-initqueue.service... Jul 2 08:52:08.668250 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.242/24, gateway 172.24.4.1 acquired from 172.24.4.1 Jul 2 08:52:08.680650 systemd[1]: Finished dracut-initqueue.service. Jul 2 08:52:08.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.681708 systemd[1]: Reached target remote-fs-pre.target. Jul 2 08:52:08.683264 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:52:08.683747 systemd[1]: Reached target remote-fs.target. Jul 2 08:52:08.685521 systemd[1]: Starting dracut-pre-mount.service... Jul 2 08:52:08.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.695425 systemd[1]: Finished dracut-pre-mount.service. Jul 2 08:52:08.855685 ignition[576]: Ignition 2.14.0 Jul 2 08:52:08.855721 ignition[576]: Stage: fetch-offline Jul 2 08:52:08.855911 ignition[576]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:08.855966 ignition[576]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:08.858726 ignition[576]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:08.858984 ignition[576]: parsed url from cmdline: "" Jul 2 08:52:08.862270 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 08:52:08.858995 ignition[576]: no config URL provided Jul 2 08:52:08.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:08.865969 systemd[1]: Starting ignition-fetch.service... Jul 2 08:52:08.859015 ignition[576]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 08:52:08.859046 ignition[576]: no config at "/usr/lib/ignition/user.ign" Jul 2 08:52:08.859066 ignition[576]: failed to fetch config: resource requires networking Jul 2 08:52:08.859946 ignition[576]: Ignition finished successfully Jul 2 08:52:08.889206 ignition[656]: Ignition 2.14.0 Jul 2 08:52:08.889251 ignition[656]: Stage: fetch Jul 2 08:52:08.889605 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:08.889675 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:08.892425 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:08.892674 ignition[656]: parsed url from cmdline: "" Jul 2 08:52:08.892689 ignition[656]: no config URL provided Jul 2 08:52:08.892709 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 08:52:08.892742 ignition[656]: no config at "/usr/lib/ignition/user.ign" Jul 2 08:52:08.900969 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Jul 2 08:52:08.901035 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Jul 2 08:52:08.901197 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Jul 2 08:52:09.128462 ignition[656]: GET result: OK Jul 2 08:52:09.128601 ignition[656]: parsing config with SHA512: abb9eb8125e40c94b95ed6431414ce2d55e1e7f35191def9148739020c0236d5044d08890bf7fc481970b3f3881ad295766d680dc3c053eb7ae36e7466b59afc Jul 2 08:52:09.143055 unknown[656]: fetched base config from "system" Jul 2 08:52:09.144426 unknown[656]: fetched base config from "system" Jul 2 08:52:09.145717 unknown[656]: fetched user config from "openstack" Jul 2 08:52:09.147740 ignition[656]: fetch: fetch complete Jul 2 08:52:09.148927 ignition[656]: fetch: fetch passed Jul 2 08:52:09.150047 ignition[656]: Ignition finished successfully Jul 2 08:52:09.152868 systemd[1]: Finished ignition-fetch.service. Jul 2 08:52:09.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.156068 systemd[1]: Starting ignition-kargs.service... Jul 2 08:52:09.175196 ignition[662]: Ignition 2.14.0 Jul 2 08:52:09.175222 ignition[662]: Stage: kargs Jul 2 08:52:09.175436 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:09.175474 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:09.177667 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:09.180100 ignition[662]: kargs: kargs passed Jul 2 08:52:09.180258 ignition[662]: Ignition finished successfully Jul 2 08:52:09.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.191904 systemd[1]: Finished ignition-kargs.service. Jul 2 08:52:09.195226 systemd[1]: Starting ignition-disks.service... Jul 2 08:52:09.210930 ignition[668]: Ignition 2.14.0 Jul 2 08:52:09.210954 ignition[668]: Stage: disks Jul 2 08:52:09.211216 ignition[668]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:09.211255 ignition[668]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:09.213470 ignition[668]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:09.215420 ignition[668]: disks: disks passed Jul 2 08:52:09.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.216855 systemd[1]: Finished ignition-disks.service. Jul 2 08:52:09.215509 ignition[668]: Ignition finished successfully Jul 2 08:52:09.219272 systemd[1]: Reached target initrd-root-device.target. Jul 2 08:52:09.221302 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:52:09.223434 systemd[1]: Reached target local-fs.target. Jul 2 08:52:09.225505 systemd[1]: Reached target sysinit.target. Jul 2 08:52:09.227709 systemd[1]: Reached target basic.target. Jul 2 08:52:09.231492 systemd[1]: Starting systemd-fsck-root.service... Jul 2 08:52:09.258974 systemd-fsck[676]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 08:52:09.267325 systemd[1]: Finished systemd-fsck-root.service. Jul 2 08:52:09.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.269590 systemd[1]: Mounting sysroot.mount... Jul 2 08:52:09.289201 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 08:52:09.290299 systemd[1]: Mounted sysroot.mount. Jul 2 08:52:09.291077 systemd[1]: Reached target initrd-root-fs.target. Jul 2 08:52:09.294816 systemd[1]: Mounting sysroot-usr.mount... Jul 2 08:52:09.295788 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 08:52:09.296729 systemd[1]: Starting flatcar-openstack-hostname.service... Jul 2 08:52:09.302402 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 08:52:09.303440 systemd[1]: Reached target ignition-diskful.target. Jul 2 08:52:09.305990 systemd[1]: Mounted sysroot-usr.mount. Jul 2 08:52:09.307922 systemd[1]: Starting initrd-setup-root.service... Jul 2 08:52:09.316971 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 08:52:09.329470 initrd-setup-root[695]: cut: /sysroot/etc/group: No such file or directory Jul 2 08:52:09.342734 initrd-setup-root[703]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 08:52:09.355693 initrd-setup-root[711]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 08:52:09.360810 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:52:09.380228 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (714) Jul 2 08:52:09.393262 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:52:09.393321 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:52:09.393351 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:52:09.409603 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:52:09.453872 systemd[1]: Finished initrd-setup-root.service. Jul 2 08:52:09.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.455696 systemd[1]: Starting ignition-mount.service... Jul 2 08:52:09.457230 systemd[1]: Starting sysroot-boot.service... Jul 2 08:52:09.471708 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 08:52:09.471830 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 08:52:09.508534 ignition[751]: INFO : Ignition 2.14.0 Jul 2 08:52:09.509969 ignition[751]: INFO : Stage: mount Jul 2 08:52:09.511037 ignition[751]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:09.511759 ignition[751]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:09.513781 ignition[751]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:09.514666 ignition[751]: INFO : mount: mount passed Jul 2 08:52:09.515169 ignition[751]: INFO : Ignition finished successfully Jul 2 08:52:09.516400 systemd[1]: Finished sysroot-boot.service. Jul 2 08:52:09.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.520342 systemd[1]: Finished ignition-mount.service. Jul 2 08:52:09.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.562383 coreos-metadata[682]: Jul 02 08:52:09.562 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 2 08:52:09.584097 coreos-metadata[682]: Jul 02 08:52:09.584 INFO Fetch successful Jul 2 08:52:09.584768 coreos-metadata[682]: Jul 02 08:52:09.584 INFO wrote hostname ci-3510-3-5-5-28b6da0899.novalocal to /sysroot/etc/hostname Jul 2 08:52:09.591025 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Jul 2 08:52:09.591291 systemd[1]: Finished flatcar-openstack-hostname.service. Jul 2 08:52:09.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:09.594920 systemd[1]: Starting ignition-files.service... Jul 2 08:52:09.606251 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:52:09.616206 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Jul 2 08:52:09.619138 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:52:09.619211 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:52:09.619238 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:52:09.671730 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:52:09.684078 ignition[778]: INFO : Ignition 2.14.0 Jul 2 08:52:09.684833 ignition[778]: INFO : Stage: files Jul 2 08:52:09.685485 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:09.686244 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:09.688294 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:09.690785 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Jul 2 08:52:09.692462 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 08:52:09.693234 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 08:52:09.705585 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 08:52:09.706639 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 08:52:09.709025 unknown[778]: wrote ssh authorized keys file for user: core Jul 2 08:52:09.709758 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 08:52:09.711143 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 2 08:52:09.712144 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 08:52:09.713308 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:52:09.714250 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:52:09.715118 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 08:52:09.716314 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 08:52:09.717397 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 08:52:09.718415 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1 Jul 2 08:52:10.152558 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 2 08:52:10.370750 systemd-networkd[633]: eth0: Gained IPv6LL Jul 2 08:52:11.731922 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 08:52:11.731922 ignition[778]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:52:11.731922 ignition[778]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:52:11.731922 ignition[778]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:52:11.742816 ignition[778]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:52:11.742816 ignition[778]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:52:11.742816 ignition[778]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:52:11.742816 ignition[778]: INFO : files: files passed Jul 2 08:52:11.742816 ignition[778]: INFO : Ignition finished successfully Jul 2 08:52:11.767186 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 08:52:11.767216 kernel: audit: type=1130 audit(1719910331.744:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.741418 systemd[1]: Finished ignition-files.service. Jul 2 08:52:11.783235 kernel: audit: type=1130 audit(1719910331.770:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.783288 kernel: audit: type=1131 audit(1719910331.773:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.745806 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 08:52:11.762380 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 08:52:11.796141 kernel: audit: type=1130 audit(1719910331.785:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.796461 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 08:52:11.765428 systemd[1]: Starting ignition-quench.service... Jul 2 08:52:11.769563 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 08:52:11.769782 systemd[1]: Finished ignition-quench.service. Jul 2 08:52:11.783936 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 08:52:11.785599 systemd[1]: Reached target ignition-complete.target. Jul 2 08:52:11.797217 systemd[1]: Starting initrd-parse-etc.service... Jul 2 08:52:11.820082 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 08:52:11.820831 systemd[1]: Finished initrd-parse-etc.service. Jul 2 08:52:11.821934 systemd[1]: Reached target initrd-fs.target. Jul 2 08:52:11.828861 kernel: audit: type=1130 audit(1719910331.821:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.828886 kernel: audit: type=1131 audit(1719910331.821:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.830051 systemd[1]: Reached target initrd.target. Jul 2 08:52:11.831632 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 08:52:11.833502 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 08:52:11.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.849535 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 08:52:11.855739 kernel: audit: type=1130 audit(1719910331.850:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.852464 systemd[1]: Starting initrd-cleanup.service... Jul 2 08:52:11.867089 systemd[1]: Stopped target nss-lookup.target. Jul 2 08:52:11.868213 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 08:52:11.869302 systemd[1]: Stopped target timers.target. Jul 2 08:52:11.870290 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 08:52:11.870966 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 08:52:11.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.875597 systemd[1]: Stopped target initrd.target. Jul 2 08:52:11.876305 kernel: audit: type=1131 audit(1719910331.871:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.876693 systemd[1]: Stopped target basic.target. Jul 2 08:52:11.877692 systemd[1]: Stopped target ignition-complete.target. Jul 2 08:52:11.878732 systemd[1]: Stopped target ignition-diskful.target. Jul 2 08:52:11.879788 systemd[1]: Stopped target initrd-root-device.target. Jul 2 08:52:11.880833 systemd[1]: Stopped target remote-fs.target. Jul 2 08:52:11.881846 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 08:52:11.882958 systemd[1]: Stopped target sysinit.target. Jul 2 08:52:11.883986 systemd[1]: Stopped target local-fs.target. Jul 2 08:52:11.884977 systemd[1]: Stopped target local-fs-pre.target. Jul 2 08:52:11.885995 systemd[1]: Stopped target swap.target. Jul 2 08:52:11.886939 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 08:52:11.887602 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 08:52:11.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.891568 systemd[1]: Stopped target cryptsetup.target. Jul 2 08:52:11.893631 kernel: audit: type=1131 audit(1719910331.888:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.893384 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 08:52:11.893662 systemd[1]: Stopped dracut-initqueue.service. Jul 2 08:52:11.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.895655 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 08:52:11.900604 kernel: audit: type=1131 audit(1719910331.895:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.895941 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 08:52:11.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.903559 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 08:52:11.905212 systemd[1]: Stopped ignition-files.service. Jul 2 08:52:11.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.908339 systemd[1]: Stopping ignition-mount.service... Jul 2 08:52:11.914605 systemd[1]: Stopping iscsiuio.service... Jul 2 08:52:11.916498 systemd[1]: Stopping sysroot-boot.service... Jul 2 08:52:11.917503 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 08:52:11.918583 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 08:52:11.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.919921 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 08:52:11.920667 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 08:52:11.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.924563 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 08:52:11.925247 systemd[1]: Stopped iscsiuio.service. Jul 2 08:52:11.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.927761 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 08:52:11.928425 systemd[1]: Finished initrd-cleanup.service. Jul 2 08:52:11.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.932177 ignition[816]: INFO : Ignition 2.14.0 Jul 2 08:52:11.932177 ignition[816]: INFO : Stage: umount Jul 2 08:52:11.932177 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:52:11.932177 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:52:11.940918 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:52:11.940918 ignition[816]: INFO : umount: umount passed Jul 2 08:52:11.940918 ignition[816]: INFO : Ignition finished successfully Jul 2 08:52:11.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.936312 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 08:52:11.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.936413 systemd[1]: Stopped ignition-mount.service. Jul 2 08:52:11.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.943710 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 08:52:11.943793 systemd[1]: Stopped ignition-disks.service. Jul 2 08:52:11.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.946441 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 08:52:11.946484 systemd[1]: Stopped ignition-kargs.service. Jul 2 08:52:11.948047 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 08:52:11.948085 systemd[1]: Stopped ignition-fetch.service. Jul 2 08:52:11.949802 systemd[1]: Stopped target network.target. Jul 2 08:52:11.951304 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 08:52:11.951348 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 08:52:11.952941 systemd[1]: Stopped target paths.target. Jul 2 08:52:11.954718 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 08:52:11.959192 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 08:52:11.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.960403 systemd[1]: Stopped target slices.target. Jul 2 08:52:11.961927 systemd[1]: Stopped target sockets.target. Jul 2 08:52:11.963978 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 08:52:11.964006 systemd[1]: Closed iscsid.socket. Jul 2 08:52:11.965277 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 08:52:11.965314 systemd[1]: Closed iscsiuio.socket. Jul 2 08:52:11.966269 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 08:52:11.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.966310 systemd[1]: Stopped ignition-setup.service. Jul 2 08:52:11.967498 systemd[1]: Stopping systemd-networkd.service... Jul 2 08:52:11.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.968564 systemd[1]: Stopping systemd-resolved.service... Jul 2 08:52:11.970701 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 08:52:11.983000 audit: BPF prog-id=6 op=UNLOAD Jul 2 08:52:11.971189 systemd-networkd[633]: eth0: DHCPv6 lease lost Jul 2 08:52:11.983000 audit: BPF prog-id=9 op=UNLOAD Jul 2 08:52:11.972060 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 08:52:11.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.972183 systemd[1]: Stopped systemd-networkd.service. Jul 2 08:52:11.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.979533 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 08:52:11.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.979653 systemd[1]: Stopped systemd-resolved.service. Jul 2 08:52:11.981674 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 08:52:11.981728 systemd[1]: Closed systemd-networkd.socket. Jul 2 08:52:11.983201 systemd[1]: Stopping network-cleanup.service... Jul 2 08:52:11.983808 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 08:52:11.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:11.983866 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 08:52:11.986188 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 08:52:11.986233 systemd[1]: Stopped systemd-sysctl.service. Jul 2 08:52:11.987370 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 08:52:11.987408 systemd[1]: Stopped systemd-modules-load.service. Jul 2 08:52:11.988118 systemd[1]: Stopping systemd-udevd.service... Jul 2 08:52:11.993909 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 08:52:11.996746 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 08:52:11.996833 systemd[1]: Stopped network-cleanup.service. Jul 2 08:52:12.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.002852 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 08:52:12.002986 systemd[1]: Stopped systemd-udevd.service. Jul 2 08:52:12.004656 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 08:52:12.004699 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 08:52:12.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.005810 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 08:52:12.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.005858 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 08:52:12.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.006853 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 08:52:12.006902 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 08:52:12.008099 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 08:52:12.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.008141 systemd[1]: Stopped dracut-cmdline.service. Jul 2 08:52:12.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.009062 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 08:52:12.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.009103 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 08:52:12.011221 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 08:52:12.011831 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 08:52:12.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.011879 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 08:52:12.019286 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 08:52:12.019337 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 08:52:12.020029 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 08:52:12.020071 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 08:52:12.022040 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 08:52:12.022618 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 08:52:12.022712 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 08:52:12.330971 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 08:52:12.331264 systemd[1]: Stopped sysroot-boot.service. Jul 2 08:52:12.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.334053 systemd[1]: Reached target initrd-switch-root.target. Jul 2 08:52:12.336060 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 08:52:12.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.336212 systemd[1]: Stopped initrd-setup-root.service. Jul 2 08:52:12.339976 systemd[1]: Starting initrd-switch-root.service... Jul 2 08:52:12.384978 systemd[1]: Switching root. Jul 2 08:52:12.422290 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Jul 2 08:52:12.422418 iscsid[641]: iscsid shutting down. Jul 2 08:52:12.424371 systemd-journald[185]: Journal stopped Jul 2 08:52:17.148923 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 08:52:17.148972 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 08:52:17.148985 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 08:52:17.149001 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 08:52:17.149016 kernel: SELinux: policy capability open_perms=1 Jul 2 08:52:17.149027 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 08:52:17.149044 kernel: SELinux: policy capability always_check_network=0 Jul 2 08:52:17.149059 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 08:52:17.149070 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 08:52:17.149081 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 08:52:17.149091 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 08:52:17.149104 systemd[1]: Successfully loaded SELinux policy in 86.840ms. Jul 2 08:52:17.149124 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.759ms. Jul 2 08:52:17.149137 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:52:17.149236 systemd[1]: Detected virtualization kvm. Jul 2 08:52:17.149251 systemd[1]: Detected architecture x86-64. Jul 2 08:52:17.149263 systemd[1]: Detected first boot. Jul 2 08:52:17.149275 systemd[1]: Hostname set to . Jul 2 08:52:17.149286 systemd[1]: Initializing machine ID from VM UUID. Jul 2 08:52:17.149298 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 08:52:17.149309 systemd[1]: Populated /etc with preset unit settings. Jul 2 08:52:17.149321 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:52:17.149337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:52:17.149350 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:52:17.149366 kernel: kauditd_printk_skb: 48 callbacks suppressed Jul 2 08:52:17.149377 kernel: audit: type=1334 audit(1719910336.890:89): prog-id=12 op=LOAD Jul 2 08:52:17.149388 kernel: audit: type=1334 audit(1719910336.890:90): prog-id=3 op=UNLOAD Jul 2 08:52:17.149399 kernel: audit: type=1334 audit(1719910336.893:91): prog-id=13 op=LOAD Jul 2 08:52:17.149411 kernel: audit: type=1334 audit(1719910336.896:92): prog-id=14 op=LOAD Jul 2 08:52:17.149422 kernel: audit: type=1334 audit(1719910336.896:93): prog-id=4 op=UNLOAD Jul 2 08:52:17.149432 kernel: audit: type=1334 audit(1719910336.896:94): prog-id=5 op=UNLOAD Jul 2 08:52:17.149443 kernel: audit: type=1334 audit(1719910336.898:95): prog-id=15 op=LOAD Jul 2 08:52:17.149453 kernel: audit: type=1334 audit(1719910336.898:96): prog-id=12 op=UNLOAD Jul 2 08:52:17.149463 kernel: audit: type=1334 audit(1719910336.901:97): prog-id=16 op=LOAD Jul 2 08:52:17.149474 kernel: audit: type=1334 audit(1719910336.910:98): prog-id=17 op=LOAD Jul 2 08:52:17.149485 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 08:52:17.149497 systemd[1]: Stopped iscsid.service. Jul 2 08:52:17.149510 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 08:52:17.149522 systemd[1]: Stopped initrd-switch-root.service. Jul 2 08:52:17.149534 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 08:52:17.149548 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 08:52:17.149561 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 08:52:17.149573 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 08:52:17.149585 systemd[1]: Created slice system-getty.slice. Jul 2 08:52:17.149596 systemd[1]: Created slice system-modprobe.slice. Jul 2 08:52:17.149608 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 08:52:17.149620 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 08:52:17.149632 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 08:52:17.149643 systemd[1]: Created slice user.slice. Jul 2 08:52:17.149657 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:52:17.149681 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 08:52:17.149694 systemd[1]: Set up automount boot.automount. Jul 2 08:52:17.149706 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 08:52:17.149717 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 08:52:17.149728 systemd[1]: Stopped target initrd-fs.target. Jul 2 08:52:17.149739 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 08:52:17.149751 systemd[1]: Reached target integritysetup.target. Jul 2 08:52:17.149762 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:52:17.149777 systemd[1]: Reached target remote-fs.target. Jul 2 08:52:17.149791 systemd[1]: Reached target slices.target. Jul 2 08:52:17.149803 systemd[1]: Reached target swap.target. Jul 2 08:52:17.149815 systemd[1]: Reached target torcx.target. Jul 2 08:52:17.149827 systemd[1]: Reached target veritysetup.target. Jul 2 08:52:17.149839 systemd[1]: Listening on systemd-coredump.socket. Jul 2 08:52:17.149851 systemd[1]: Listening on systemd-initctl.socket. Jul 2 08:52:17.149863 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:52:17.149876 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:52:17.149888 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:52:17.149903 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 08:52:17.149915 systemd[1]: Mounting dev-hugepages.mount... Jul 2 08:52:17.149927 systemd[1]: Mounting dev-mqueue.mount... Jul 2 08:52:17.149940 systemd[1]: Mounting media.mount... Jul 2 08:52:17.149953 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:17.149965 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 08:52:17.149977 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 08:52:17.149989 systemd[1]: Mounting tmp.mount... Jul 2 08:52:17.150001 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 08:52:17.150015 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:52:17.150028 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:52:17.150040 systemd[1]: Starting modprobe@configfs.service... Jul 2 08:52:17.150052 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:52:17.150064 systemd[1]: Starting modprobe@drm.service... Jul 2 08:52:17.150077 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:52:17.150089 systemd[1]: Starting modprobe@fuse.service... Jul 2 08:52:17.150101 systemd[1]: Starting modprobe@loop.service... Jul 2 08:52:17.150114 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 08:52:17.150129 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 08:52:17.150141 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 08:52:17.151986 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 08:52:17.152003 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 08:52:17.152015 systemd[1]: Stopped systemd-journald.service. Jul 2 08:52:17.152026 systemd[1]: Starting systemd-journald.service... Jul 2 08:52:17.152038 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:52:17.152049 systemd[1]: Starting systemd-network-generator.service... Jul 2 08:52:17.152061 systemd[1]: Starting systemd-remount-fs.service... Jul 2 08:52:17.152076 kernel: fuse: init (API version 7.34) Jul 2 08:52:17.152087 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:52:17.152099 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 08:52:17.152111 systemd[1]: Stopped verity-setup.service. Jul 2 08:52:17.152122 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:17.152134 systemd[1]: Mounted dev-hugepages.mount. Jul 2 08:52:17.152168 systemd[1]: Mounted dev-mqueue.mount. Jul 2 08:52:17.152182 systemd[1]: Mounted media.mount. Jul 2 08:52:17.152194 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 08:52:17.152208 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 08:52:17.152220 systemd[1]: Mounted tmp.mount. Jul 2 08:52:17.152231 kernel: loop: module loaded Jul 2 08:52:17.152243 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:52:17.152254 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 08:52:17.152266 systemd[1]: Finished modprobe@configfs.service. Jul 2 08:52:17.152278 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:52:17.152291 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:52:17.152303 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:52:17.152315 systemd[1]: Finished modprobe@drm.service. Jul 2 08:52:17.152327 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:52:17.152339 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:52:17.152350 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 08:52:17.152361 systemd[1]: Finished modprobe@fuse.service. Jul 2 08:52:17.152375 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 08:52:17.152389 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:52:17.152403 systemd-journald[930]: Journal started Jul 2 08:52:17.152446 systemd-journald[930]: Runtime Journal (/run/log/journal/78928fe3ecc0452b9178eb8f939c10a4) is 4.9M, max 39.5M, 34.5M free. Jul 2 08:52:12.715000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 08:52:12.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:52:12.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:52:12.807000 audit: BPF prog-id=10 op=LOAD Jul 2 08:52:12.807000 audit: BPF prog-id=10 op=UNLOAD Jul 2 08:52:12.807000 audit: BPF prog-id=11 op=LOAD Jul 2 08:52:12.807000 audit: BPF prog-id=11 op=UNLOAD Jul 2 08:52:12.960000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 08:52:12.960000 audit[849]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:12.960000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:52:12.962000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 08:52:12.962000 audit[849]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:12.962000 audit: CWD cwd="/" Jul 2 08:52:12.962000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:12.962000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:12.962000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:52:16.890000 audit: BPF prog-id=12 op=LOAD Jul 2 08:52:16.890000 audit: BPF prog-id=3 op=UNLOAD Jul 2 08:52:16.893000 audit: BPF prog-id=13 op=LOAD Jul 2 08:52:16.896000 audit: BPF prog-id=14 op=LOAD Jul 2 08:52:16.896000 audit: BPF prog-id=4 op=UNLOAD Jul 2 08:52:16.896000 audit: BPF prog-id=5 op=UNLOAD Jul 2 08:52:16.898000 audit: BPF prog-id=15 op=LOAD Jul 2 08:52:16.898000 audit: BPF prog-id=12 op=UNLOAD Jul 2 08:52:16.901000 audit: BPF prog-id=16 op=LOAD Jul 2 08:52:16.910000 audit: BPF prog-id=17 op=LOAD Jul 2 08:52:16.910000 audit: BPF prog-id=13 op=UNLOAD Jul 2 08:52:16.910000 audit: BPF prog-id=14 op=UNLOAD Jul 2 08:52:16.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:16.923000 audit: BPF prog-id=15 op=UNLOAD Jul 2 08:52:16.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:16.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:16.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.079000 audit: BPF prog-id=18 op=LOAD Jul 2 08:52:17.080000 audit: BPF prog-id=19 op=LOAD Jul 2 08:52:17.080000 audit: BPF prog-id=20 op=LOAD Jul 2 08:52:17.080000 audit: BPF prog-id=16 op=UNLOAD Jul 2 08:52:17.080000 audit: BPF prog-id=17 op=UNLOAD Jul 2 08:52:17.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.147000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 08:52:17.147000 audit[930]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff7fe0e640 a2=4000 a3=7fff7fe0e6dc items=0 ppid=1 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:17.147000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 08:52:17.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.956116 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:52:16.888927 systemd[1]: Queued start job for default target multi-user.target. Jul 2 08:52:17.158974 systemd[1]: Finished modprobe@loop.service. Jul 2 08:52:17.159001 systemd[1]: Started systemd-journald.service. Jul 2 08:52:17.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.957042 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:52:16.888940 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 08:52:12.957064 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:52:16.911470 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 08:52:12.957096 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 08:52:17.157724 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:52:12.957108 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 08:52:17.158514 systemd[1]: Finished systemd-network-generator.service. Jul 2 08:52:12.957138 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 08:52:12.957170 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 08:52:17.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:12.957365 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 08:52:17.160275 systemd[1]: Finished systemd-remount-fs.service. Jul 2 08:52:12.957404 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:52:17.161099 systemd[1]: Reached target network-pre.target. Jul 2 08:52:12.957421 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:52:12.959686 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 08:52:12.959725 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 08:52:12.959746 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 08:52:12.959762 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 08:52:12.959780 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 08:52:12.959796 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 08:52:16.425592 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:52:16.425910 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:52:16.426203 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:52:16.427294 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:52:17.162722 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 08:52:16.427626 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 08:52:16.427792 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-07-02T08:52:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 08:52:17.166729 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 08:52:17.169246 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 08:52:17.171683 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 08:52:17.173484 systemd[1]: Starting systemd-journal-flush.service... Jul 2 08:52:17.174538 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:52:17.175691 systemd[1]: Starting systemd-random-seed.service... Jul 2 08:52:17.176663 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:52:17.178303 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:52:17.181252 systemd[1]: Starting systemd-sysusers.service... Jul 2 08:52:17.183835 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 08:52:17.185422 systemd-journald[930]: Time spent on flushing to /var/log/journal/78928fe3ecc0452b9178eb8f939c10a4 is 25.530ms for 1092 entries. Jul 2 08:52:17.185422 systemd-journald[930]: System Journal (/var/log/journal/78928fe3ecc0452b9178eb8f939c10a4) is 8.0M, max 584.8M, 576.8M free. Jul 2 08:52:17.232938 systemd-journald[930]: Received client request to flush runtime journal. Jul 2 08:52:17.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.186358 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 08:52:17.234378 udevadm[956]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 08:52:17.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.202003 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:52:17.203626 systemd[1]: Starting systemd-udev-settle.service... Jul 2 08:52:17.204544 systemd[1]: Finished systemd-random-seed.service. Jul 2 08:52:17.205291 systemd[1]: Reached target first-boot-complete.target. Jul 2 08:52:17.216474 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:52:17.234068 systemd[1]: Finished systemd-journal-flush.service. Jul 2 08:52:17.245586 systemd[1]: Finished systemd-sysusers.service. Jul 2 08:52:17.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.247302 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 08:52:17.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:17.393746 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 08:52:18.285085 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 08:52:18.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:18.287000 audit: BPF prog-id=21 op=LOAD Jul 2 08:52:18.287000 audit: BPF prog-id=22 op=LOAD Jul 2 08:52:18.287000 audit: BPF prog-id=7 op=UNLOAD Jul 2 08:52:18.287000 audit: BPF prog-id=8 op=UNLOAD Jul 2 08:52:18.289040 systemd[1]: Starting systemd-udevd.service... Jul 2 08:52:18.336698 systemd-udevd[961]: Using default interface naming scheme 'v252'. Jul 2 08:52:18.553105 systemd[1]: Started systemd-udevd.service. Jul 2 08:52:18.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:18.556000 audit: BPF prog-id=23 op=LOAD Jul 2 08:52:18.561982 systemd[1]: Starting systemd-networkd.service... Jul 2 08:52:18.582000 audit: BPF prog-id=24 op=LOAD Jul 2 08:52:18.583000 audit: BPF prog-id=25 op=LOAD Jul 2 08:52:18.583000 audit: BPF prog-id=26 op=LOAD Jul 2 08:52:18.585641 systemd[1]: Starting systemd-userdbd.service... Jul 2 08:52:18.655825 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 08:52:18.657657 systemd[1]: Started systemd-userdbd.service. Jul 2 08:52:18.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:18.727209 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 08:52:18.738217 kernel: ACPI: button: Power Button [PWRF] Jul 2 08:52:18.762503 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:52:18.780000 audit[974]: AVC avc: denied { confidentiality } for pid=974 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 08:52:18.780000 audit[974]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bced555c40 a1=3207c a2=7f4c6ac9fbc5 a3=5 items=108 ppid=961 pid=974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:18.780000 audit: CWD cwd="/" Jul 2 08:52:18.780000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=1 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=2 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=3 name=(null) inode=13212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=4 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=5 name=(null) inode=13213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=6 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=7 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=8 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=9 name=(null) inode=13215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=10 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=11 name=(null) inode=13216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=12 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=13 name=(null) inode=13217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=14 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=15 name=(null) inode=13218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=16 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=17 name=(null) inode=13219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=18 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=19 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=20 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=21 name=(null) inode=13221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=22 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=23 name=(null) inode=13222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=24 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=25 name=(null) inode=13223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=26 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=27 name=(null) inode=13224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=28 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=29 name=(null) inode=13225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=30 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=31 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=32 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=33 name=(null) inode=13227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=34 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=35 name=(null) inode=13228 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=36 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=37 name=(null) inode=13229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=38 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=39 name=(null) inode=13230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=40 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=41 name=(null) inode=13231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=42 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=43 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=44 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=45 name=(null) inode=13233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=46 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=47 name=(null) inode=13234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=48 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=49 name=(null) inode=13235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=50 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=51 name=(null) inode=13236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=52 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=53 name=(null) inode=13237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=55 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=56 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=57 name=(null) inode=13239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=58 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=59 name=(null) inode=13240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=60 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=61 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=62 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=63 name=(null) inode=13242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=64 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=65 name=(null) inode=13243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=66 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=67 name=(null) inode=13244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=68 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=69 name=(null) inode=13245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=70 name=(null) inode=13241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=71 name=(null) inode=13246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=72 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=73 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=74 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=75 name=(null) inode=13248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=76 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=77 name=(null) inode=13249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=78 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=79 name=(null) inode=13250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=80 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=81 name=(null) inode=13251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=82 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=83 name=(null) inode=13252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=84 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=85 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=86 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=87 name=(null) inode=13254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=88 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=89 name=(null) inode=13255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=90 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=91 name=(null) inode=13256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=92 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=93 name=(null) inode=13257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=94 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=95 name=(null) inode=13258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=96 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=97 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=98 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=99 name=(null) inode=13260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=100 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=101 name=(null) inode=13261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=102 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=103 name=(null) inode=13262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=104 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=105 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=106 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PATH item=107 name=(null) inode=13264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:52:18.780000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 08:52:18.855238 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jul 2 08:52:18.861170 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 08:52:18.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:18.864627 systemd[1]: Finished systemd-udev-settle.service. Jul 2 08:52:18.866461 systemd[1]: Starting lvm2-activation-early.service... Jul 2 08:52:18.879188 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 08:52:19.037858 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:52:19.042236 systemd-networkd[971]: lo: Link UP Jul 2 08:52:19.042664 systemd-networkd[971]: lo: Gained carrier Jul 2 08:52:19.043851 systemd-networkd[971]: Enumeration completed Jul 2 08:52:19.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.044216 systemd[1]: Started systemd-networkd.service. Jul 2 08:52:19.046038 systemd-networkd[971]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:52:19.049461 systemd-networkd[971]: eth0: Link UP Jul 2 08:52:19.049623 systemd-networkd[971]: eth0: Gained carrier Jul 2 08:52:19.064591 systemd-networkd[971]: eth0: DHCPv4 address 172.24.4.242/24, gateway 172.24.4.1 acquired from 172.24.4.1 Jul 2 08:52:19.080264 systemd[1]: Finished lvm2-activation-early.service. Jul 2 08:52:19.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.081710 systemd[1]: Reached target cryptsetup.target. Jul 2 08:52:19.085209 systemd[1]: Starting lvm2-activation.service... Jul 2 08:52:19.096107 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:52:19.141265 systemd[1]: Finished lvm2-activation.service. Jul 2 08:52:19.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.142580 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:52:19.143683 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 08:52:19.143745 systemd[1]: Reached target local-fs.target. Jul 2 08:52:19.144798 systemd[1]: Reached target machines.target. Jul 2 08:52:19.148297 systemd[1]: Starting ldconfig.service... Jul 2 08:52:19.150947 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:52:19.151070 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:19.153410 systemd[1]: Starting systemd-boot-update.service... Jul 2 08:52:19.156644 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 08:52:19.161508 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 08:52:19.169919 systemd[1]: Starting systemd-sysext.service... Jul 2 08:52:19.189275 systemd[1]: boot.automount: Got automount request for /boot, triggered by 993 (bootctl) Jul 2 08:52:19.191786 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 08:52:19.264847 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 08:52:19.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.270755 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 08:52:19.332443 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 08:52:19.332820 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 08:52:19.568277 kernel: loop0: detected capacity change from 0 to 209816 Jul 2 08:52:19.628495 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 08:52:19.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.629825 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 08:52:19.674292 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 08:52:19.710347 kernel: loop1: detected capacity change from 0 to 209816 Jul 2 08:52:19.779390 (sd-sysext)[1008]: Using extensions 'kubernetes'. Jul 2 08:52:19.782648 (sd-sysext)[1008]: Merged extensions into '/usr'. Jul 2 08:52:19.855599 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:19.859006 systemd[1]: Mounting usr-share-oem.mount... Jul 2 08:52:19.859794 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:52:19.864533 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:52:19.869401 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:52:19.872557 systemd[1]: Starting modprobe@loop.service... Jul 2 08:52:19.873082 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:52:19.873255 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:19.873399 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:19.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.875312 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:52:19.875470 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:52:19.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.881524 systemd-fsck[1005]: fsck.fat 4.2 (2021-01-31) Jul 2 08:52:19.881524 systemd-fsck[1005]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 08:52:19.884975 systemd[1]: Mounted usr-share-oem.mount. Jul 2 08:52:19.888912 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:52:19.890331 systemd[1]: Finished modprobe@loop.service. Jul 2 08:52:19.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.893811 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 08:52:19.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.896750 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:52:19.897296 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:52:19.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.908930 systemd[1]: Mounting boot.mount... Jul 2 08:52:19.909860 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:52:19.909942 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:52:19.910678 systemd[1]: Finished systemd-sysext.service. Jul 2 08:52:19.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:19.913397 systemd[1]: Starting ensure-sysext.service... Jul 2 08:52:19.915881 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 08:52:19.929560 systemd[1]: Reloading. Jul 2 08:52:19.937997 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 08:52:19.940797 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 08:52:19.948357 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 08:52:19.998655 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-07-02T08:52:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:52:19.998697 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-07-02T08:52:19Z" level=info msg="torcx already run" Jul 2 08:52:20.123503 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:52:20.123528 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:52:20.152071 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:52:20.215000 audit: BPF prog-id=27 op=LOAD Jul 2 08:52:20.215000 audit: BPF prog-id=18 op=UNLOAD Jul 2 08:52:20.216000 audit: BPF prog-id=28 op=LOAD Jul 2 08:52:20.216000 audit: BPF prog-id=29 op=LOAD Jul 2 08:52:20.216000 audit: BPF prog-id=19 op=UNLOAD Jul 2 08:52:20.216000 audit: BPF prog-id=20 op=UNLOAD Jul 2 08:52:20.219000 audit: BPF prog-id=30 op=LOAD Jul 2 08:52:20.219000 audit: BPF prog-id=24 op=UNLOAD Jul 2 08:52:20.219000 audit: BPF prog-id=31 op=LOAD Jul 2 08:52:20.219000 audit: BPF prog-id=32 op=LOAD Jul 2 08:52:20.219000 audit: BPF prog-id=25 op=UNLOAD Jul 2 08:52:20.219000 audit: BPF prog-id=26 op=UNLOAD Jul 2 08:52:20.221000 audit: BPF prog-id=33 op=LOAD Jul 2 08:52:20.221000 audit: BPF prog-id=23 op=UNLOAD Jul 2 08:52:20.221000 audit: BPF prog-id=34 op=LOAD Jul 2 08:52:20.221000 audit: BPF prog-id=35 op=LOAD Jul 2 08:52:20.221000 audit: BPF prog-id=21 op=UNLOAD Jul 2 08:52:20.221000 audit: BPF prog-id=22 op=UNLOAD Jul 2 08:52:20.230492 systemd[1]: Mounted boot.mount. Jul 2 08:52:20.249537 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.251240 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:52:20.254990 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:52:20.256474 systemd[1]: Starting modprobe@loop.service... Jul 2 08:52:20.257103 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.257262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:20.258116 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:52:20.258457 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:52:20.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.262034 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:52:20.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.263200 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:52:20.263986 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:52:20.264094 systemd[1]: Finished modprobe@loop.service. Jul 2 08:52:20.264900 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:52:20.265002 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.267487 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.268918 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:52:20.270515 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:52:20.272538 systemd[1]: Starting modprobe@loop.service... Jul 2 08:52:20.273098 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.273255 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:20.277674 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.279247 systemd[1]: Starting modprobe@drm.service... Jul 2 08:52:20.279841 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.279987 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:20.282132 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 08:52:20.284696 systemd[1]: Finished ensure-sysext.service. Jul 2 08:52:20.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.289121 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:52:20.289296 systemd[1]: Finished modprobe@drm.service. Jul 2 08:52:20.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.291429 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:52:20.291557 systemd[1]: Finished modprobe@loop.service. Jul 2 08:52:20.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.297178 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:52:20.297314 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:52:20.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.298036 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:52:20.298192 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:52:20.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.298754 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:52:20.298787 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:52:20.330536 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:20.330580 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:52:20.354456 systemd-networkd[971]: eth0: Gained IPv6LL Jul 2 08:52:20.362789 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 08:52:20.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:20.411426 systemd[1]: Finished systemd-boot-update.service. Jul 2 08:52:20.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.597194 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 08:52:21.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.602920 systemd[1]: Starting audit-rules.service... Jul 2 08:52:21.606990 systemd[1]: Starting clean-ca-certificates.service... Jul 2 08:52:21.610960 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 08:52:21.615000 audit: BPF prog-id=36 op=LOAD Jul 2 08:52:21.617357 systemd[1]: Starting systemd-resolved.service... Jul 2 08:52:21.621000 audit: BPF prog-id=37 op=LOAD Jul 2 08:52:21.623536 systemd[1]: Starting systemd-timesyncd.service... Jul 2 08:52:21.627702 systemd[1]: Starting systemd-update-utmp.service... Jul 2 08:52:21.658000 audit[1096]: SYSTEM_BOOT pid=1096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.666792 systemd[1]: Finished systemd-update-utmp.service. Jul 2 08:52:21.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.682798 systemd[1]: Finished clean-ca-certificates.service. Jul 2 08:52:21.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.684022 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:52:21.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:21.755314 systemd[1]: Started systemd-timesyncd.service. Jul 2 08:52:21.755901 systemd[1]: Reached target time-set.target. Jul 2 08:52:21.787745 systemd-resolved[1094]: Positive Trust Anchors: Jul 2 08:52:21.788421 systemd-resolved[1094]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:52:21.788654 systemd-resolved[1094]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:52:21.807846 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 08:52:21.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:22.371260 systemd-timesyncd[1095]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Jul 2 08:52:22.371429 systemd-timesyncd[1095]: Initial clock synchronization to Tue 2024-07-02 08:52:22.371035 UTC. Jul 2 08:52:22.373181 systemd-resolved[1094]: Using system hostname 'ci-3510-3-5-5-28b6da0899.novalocal'. Jul 2 08:52:22.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:22.376929 systemd[1]: Started systemd-resolved.service. Jul 2 08:52:22.377905 systemd[1]: Reached target network.target. Jul 2 08:52:22.378763 systemd[1]: Reached target network-online.target. Jul 2 08:52:22.379723 systemd[1]: Reached target nss-lookup.target. Jul 2 08:52:22.417000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 08:52:22.417000 audit[1112]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffece8e0470 a2=420 a3=0 items=0 ppid=1091 pid=1112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:22.417000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 08:52:22.418448 augenrules[1112]: No rules Jul 2 08:52:22.420608 systemd[1]: Finished audit-rules.service. Jul 2 08:52:22.780965 ldconfig[992]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 08:52:22.802415 systemd[1]: Finished ldconfig.service. Jul 2 08:52:22.806664 systemd[1]: Starting systemd-update-done.service... Jul 2 08:52:22.823307 systemd[1]: Finished systemd-update-done.service. Jul 2 08:52:22.824735 systemd[1]: Reached target sysinit.target. Jul 2 08:52:22.826022 systemd[1]: Started motdgen.path. Jul 2 08:52:22.827209 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 08:52:22.829092 systemd[1]: Started logrotate.timer. Jul 2 08:52:22.830346 systemd[1]: Started mdadm.timer. Jul 2 08:52:22.831382 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 08:52:22.832594 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 08:52:22.832666 systemd[1]: Reached target paths.target. Jul 2 08:52:22.833715 systemd[1]: Reached target timers.target. Jul 2 08:52:22.835895 systemd[1]: Listening on dbus.socket. Jul 2 08:52:22.839543 systemd[1]: Starting docker.socket... Jul 2 08:52:22.846694 systemd[1]: Listening on sshd.socket. Jul 2 08:52:22.848289 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:22.849521 systemd[1]: Listening on docker.socket. Jul 2 08:52:22.850962 systemd[1]: Reached target sockets.target. Jul 2 08:52:22.852249 systemd[1]: Reached target basic.target. Jul 2 08:52:22.853655 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:52:22.853910 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:52:22.856238 systemd[1]: Starting containerd.service... Jul 2 08:52:22.860139 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 08:52:22.864027 systemd[1]: Starting dbus.service... Jul 2 08:52:22.867803 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 08:52:22.870778 systemd[1]: Starting extend-filesystems.service... Jul 2 08:52:22.872774 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 08:52:22.876912 systemd[1]: Starting kubelet.service... Jul 2 08:52:22.878568 systemd[1]: Starting motdgen.service... Jul 2 08:52:22.881356 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 08:52:22.884680 systemd[1]: Starting sshd-keygen.service... Jul 2 08:52:22.890615 systemd[1]: Starting systemd-logind.service... Jul 2 08:52:22.891561 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:52:22.929378 jq[1125]: false Jul 2 08:52:22.891645 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 08:52:22.892324 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 08:52:22.941750 jq[1133]: true Jul 2 08:52:22.894718 systemd[1]: Starting update-engine.service... Jul 2 08:52:22.899215 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 08:52:22.927251 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 08:52:22.927734 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 08:52:22.939182 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 08:52:22.939351 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 08:52:22.955162 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 08:52:22.955333 systemd[1]: Finished motdgen.service. Jul 2 08:52:22.973224 jq[1137]: true Jul 2 08:52:22.999097 extend-filesystems[1126]: Found loop1 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda1 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda2 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda3 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found usr Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda4 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda6 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda7 Jul 2 08:52:22.999097 extend-filesystems[1126]: Found vda9 Jul 2 08:52:22.999097 extend-filesystems[1126]: Checking size of /dev/vda9 Jul 2 08:52:23.029690 extend-filesystems[1126]: Resized partition /dev/vda9 Jul 2 08:52:23.046326 extend-filesystems[1176]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 08:52:23.067761 env[1136]: time="2024-07-02T08:52:23.067677892Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 08:52:23.074517 systemd[1]: Created slice system-sshd.slice. Jul 2 08:52:23.095488 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Jul 2 08:52:23.108452 dbus-daemon[1124]: [system] SELinux support is enabled Jul 2 08:52:23.108720 systemd[1]: Started dbus.service. Jul 2 08:52:23.111491 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 08:52:23.111519 systemd[1]: Reached target system-config.target. Jul 2 08:52:23.112141 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 08:52:23.112172 systemd[1]: Reached target user-config.target. Jul 2 08:52:23.115792 systemd-logind[1131]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 08:52:23.116130 systemd-logind[1131]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 08:52:23.118285 systemd-logind[1131]: New seat seat0. Jul 2 08:52:23.123223 systemd[1]: Started systemd-logind.service. Jul 2 08:52:23.201425 update_engine[1132]: I0702 08:52:23.147373 1132 main.cc:92] Flatcar Update Engine starting Jul 2 08:52:23.201425 update_engine[1132]: I0702 08:52:23.156064 1132 update_check_scheduler.cc:74] Next update check in 11m24s Jul 2 08:52:23.201665 env[1136]: time="2024-07-02T08:52:23.148716260Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 08:52:23.156244 systemd[1]: Started update-engine.service. Jul 2 08:52:23.158758 systemd[1]: Started locksmithd.service. Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.210839973Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212302546Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212332732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212590636Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212612958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212628737Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212641431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212732432Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.212997549Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:52:23.213524 env[1136]: time="2024-07-02T08:52:23.213132362Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:52:23.215576 env[1136]: time="2024-07-02T08:52:23.213153812Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 08:52:23.215576 env[1136]: time="2024-07-02T08:52:23.213208605Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 08:52:23.215576 env[1136]: time="2024-07-02T08:52:23.213224344Z" level=info msg="metadata content store policy set" policy=shared Jul 2 08:52:23.214437 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 08:52:23.215727 bash[1173]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:52:23.229490 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Jul 2 08:52:23.313656 extend-filesystems[1176]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 08:52:23.313656 extend-filesystems[1176]: old_desc_blocks = 1, new_desc_blocks = 3 Jul 2 08:52:23.313656 extend-filesystems[1176]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Jul 2 08:52:23.330052 extend-filesystems[1126]: Resized filesystem in /dev/vda9 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323293609Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323336039Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323353171Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323400460Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323549219Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323734667Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323817352Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323900217Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.323943398Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.324042344Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.324119839Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.324159103Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.324654622Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 08:52:23.334148 env[1136]: time="2024-07-02T08:52:23.325038993Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 08:52:23.314072 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326012649Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326186475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326283176Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326515252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326601022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326643422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326716128Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326753869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326828178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326900153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.326938055Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.327014909Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.333770779Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.333885745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.336426 env[1136]: time="2024-07-02T08:52:23.333972528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.314233 systemd[1]: Finished extend-filesystems.service. Jul 2 08:52:23.337449 env[1136]: time="2024-07-02T08:52:23.335290339Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 08:52:23.337449 env[1136]: time="2024-07-02T08:52:23.335400786Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 08:52:23.337449 env[1136]: time="2024-07-02T08:52:23.335512446Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 08:52:23.337449 env[1136]: time="2024-07-02T08:52:23.335599549Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 08:52:23.337449 env[1136]: time="2024-07-02T08:52:23.335699286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 08:52:23.342993 systemd[1]: Started containerd.service. Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.340436531Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.340671371Z" level=info msg="Connect containerd service" Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.340760919Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.342171545Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.342722538Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.342824620Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 08:52:23.346601 env[1136]: time="2024-07-02T08:52:23.342943142Z" level=info msg="containerd successfully booted in 0.277789s" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.346893170Z" level=info msg="Start subscribing containerd event" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.346949376Z" level=info msg="Start recovering state" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.347021070Z" level=info msg="Start event monitor" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.347038433Z" level=info msg="Start snapshots syncer" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.347050906Z" level=info msg="Start cni network conf syncer for default" Jul 2 08:52:23.356354 env[1136]: time="2024-07-02T08:52:23.347059051Z" level=info msg="Start streaming server" Jul 2 08:52:23.494507 locksmithd[1189]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 08:52:24.094531 sshd_keygen[1150]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 08:52:24.128965 systemd[1]: Finished sshd-keygen.service. Jul 2 08:52:24.130993 systemd[1]: Starting issuegen.service... Jul 2 08:52:24.132644 systemd[1]: Started sshd@0-172.24.4.242:22-172.24.4.1:52824.service. Jul 2 08:52:24.139623 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 08:52:24.139779 systemd[1]: Finished issuegen.service. Jul 2 08:52:24.141796 systemd[1]: Starting systemd-user-sessions.service... Jul 2 08:52:24.150012 systemd[1]: Finished systemd-user-sessions.service. Jul 2 08:52:24.151859 systemd[1]: Started getty@tty1.service. Jul 2 08:52:24.153719 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 08:52:24.154382 systemd[1]: Reached target getty.target. Jul 2 08:52:25.063363 systemd[1]: Started kubelet.service. Jul 2 08:52:25.618366 sshd[1207]: Accepted publickey for core from 172.24.4.1 port 52824 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:25.625251 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:25.657104 systemd[1]: Created slice user-500.slice. Jul 2 08:52:25.662099 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 08:52:25.670794 systemd-logind[1131]: New session 1 of user core. Jul 2 08:52:25.678811 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 08:52:25.681967 systemd[1]: Starting user@500.service... Jul 2 08:52:25.734616 (systemd)[1222]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:26.041728 systemd[1222]: Queued start job for default target default.target. Jul 2 08:52:26.043075 systemd[1222]: Reached target paths.target. Jul 2 08:52:26.043184 systemd[1222]: Reached target sockets.target. Jul 2 08:52:26.043269 systemd[1222]: Reached target timers.target. Jul 2 08:52:26.043350 systemd[1222]: Reached target basic.target. Jul 2 08:52:26.043526 systemd[1]: Started user@500.service. Jul 2 08:52:26.044987 systemd[1]: Started session-1.scope. Jul 2 08:52:26.050584 systemd[1222]: Reached target default.target. Jul 2 08:52:26.050739 systemd[1222]: Startup finished in 300ms. Jul 2 08:52:26.554429 systemd[1]: Started sshd@1-172.24.4.242:22-172.24.4.1:52690.service. Jul 2 08:52:27.113649 kubelet[1216]: E0702 08:52:27.113579 1216 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:52:27.117445 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:52:27.117609 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:52:27.117872 systemd[1]: kubelet.service: Consumed 2.134s CPU time. Jul 2 08:52:28.384101 sshd[1232]: Accepted publickey for core from 172.24.4.1 port 52690 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:28.388142 sshd[1232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:28.400957 systemd[1]: Started session-2.scope. Jul 2 08:52:28.403375 systemd-logind[1131]: New session 2 of user core. Jul 2 08:52:29.036334 sshd[1232]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:29.042369 systemd[1]: Started sshd@2-172.24.4.242:22-172.24.4.1:52700.service. Jul 2 08:52:29.048950 systemd[1]: sshd@1-172.24.4.242:22-172.24.4.1:52690.service: Deactivated successfully. Jul 2 08:52:29.050592 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 08:52:29.055097 systemd-logind[1131]: Session 2 logged out. Waiting for processes to exit. Jul 2 08:52:29.057885 systemd-logind[1131]: Removed session 2. Jul 2 08:52:30.044022 coreos-metadata[1121]: Jul 02 08:52:30.043 WARN failed to locate config-drive, using the metadata service API instead Jul 2 08:52:30.151608 coreos-metadata[1121]: Jul 02 08:52:30.151 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Jul 2 08:52:30.511792 coreos-metadata[1121]: Jul 02 08:52:30.511 INFO Fetch successful Jul 2 08:52:30.511792 coreos-metadata[1121]: Jul 02 08:52:30.511 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 08:52:30.527622 coreos-metadata[1121]: Jul 02 08:52:30.527 INFO Fetch successful Jul 2 08:52:30.592867 sshd[1239]: Accepted publickey for core from 172.24.4.1 port 52700 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:30.595431 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:30.605674 systemd-logind[1131]: New session 3 of user core. Jul 2 08:52:30.606438 systemd[1]: Started session-3.scope. Jul 2 08:52:30.607677 unknown[1121]: wrote ssh authorized keys file for user: core Jul 2 08:52:30.799241 update-ssh-keys[1245]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:52:30.800957 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 08:52:30.801860 systemd[1]: Reached target multi-user.target. Jul 2 08:52:30.804813 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 08:52:30.823606 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 08:52:30.824085 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 08:52:30.825308 systemd[1]: Startup finished in 966ms (kernel) + 6.842s (initrd) + 17.677s (userspace) = 25.486s. Jul 2 08:52:31.244814 sshd[1239]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:31.251539 systemd-logind[1131]: Session 3 logged out. Waiting for processes to exit. Jul 2 08:52:31.251782 systemd[1]: sshd@2-172.24.4.242:22-172.24.4.1:52700.service: Deactivated successfully. Jul 2 08:52:31.253092 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 08:52:31.254730 systemd-logind[1131]: Removed session 3. Jul 2 08:52:37.369388 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 08:52:37.369873 systemd[1]: Stopped kubelet.service. Jul 2 08:52:37.369952 systemd[1]: kubelet.service: Consumed 2.134s CPU time. Jul 2 08:52:37.372826 systemd[1]: Starting kubelet.service... Jul 2 08:52:37.771383 systemd[1]: Started kubelet.service. Jul 2 08:52:38.365899 kubelet[1253]: E0702 08:52:38.365629 1253 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:52:38.375032 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:52:38.375354 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:52:41.275810 systemd[1]: Started sshd@3-172.24.4.242:22-172.24.4.1:36826.service. Jul 2 08:52:42.561942 sshd[1260]: Accepted publickey for core from 172.24.4.1 port 36826 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:42.565640 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:42.577007 systemd[1]: Started session-4.scope. Jul 2 08:52:42.579636 systemd-logind[1131]: New session 4 of user core. Jul 2 08:52:43.181357 sshd[1260]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:43.185960 systemd[1]: Started sshd@4-172.24.4.242:22-172.24.4.1:36828.service. Jul 2 08:52:43.189147 systemd[1]: sshd@3-172.24.4.242:22-172.24.4.1:36826.service: Deactivated successfully. Jul 2 08:52:43.189973 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 08:52:43.192427 systemd-logind[1131]: Session 4 logged out. Waiting for processes to exit. Jul 2 08:52:43.194827 systemd-logind[1131]: Removed session 4. Jul 2 08:52:44.537906 sshd[1265]: Accepted publickey for core from 172.24.4.1 port 36828 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:44.541611 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:44.555138 systemd-logind[1131]: New session 5 of user core. Jul 2 08:52:44.556599 systemd[1]: Started session-5.scope. Jul 2 08:52:45.330595 sshd[1265]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:45.337529 systemd[1]: Started sshd@5-172.24.4.242:22-172.24.4.1:55208.service. Jul 2 08:52:45.342951 systemd[1]: sshd@4-172.24.4.242:22-172.24.4.1:36828.service: Deactivated successfully. Jul 2 08:52:45.344897 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 08:52:45.348943 systemd-logind[1131]: Session 5 logged out. Waiting for processes to exit. Jul 2 08:52:45.352188 systemd-logind[1131]: Removed session 5. Jul 2 08:52:46.520555 sshd[1271]: Accepted publickey for core from 172.24.4.1 port 55208 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:46.525665 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:46.537288 systemd-logind[1131]: New session 6 of user core. Jul 2 08:52:46.538500 systemd[1]: Started session-6.scope. Jul 2 08:52:47.196585 sshd[1271]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:47.202721 systemd[1]: Started sshd@6-172.24.4.242:22-172.24.4.1:55222.service. Jul 2 08:52:47.205762 systemd[1]: sshd@5-172.24.4.242:22-172.24.4.1:55208.service: Deactivated successfully. Jul 2 08:52:47.207293 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 08:52:47.211566 systemd-logind[1131]: Session 6 logged out. Waiting for processes to exit. Jul 2 08:52:47.214426 systemd-logind[1131]: Removed session 6. Jul 2 08:52:48.530567 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 08:52:48.530885 systemd[1]: Stopped kubelet.service. Jul 2 08:52:48.532532 systemd[1]: Starting kubelet.service... Jul 2 08:52:48.743820 systemd[1]: Started kubelet.service. Jul 2 08:52:48.882258 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 55222 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:48.886808 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:48.901653 systemd-logind[1131]: New session 7 of user core. Jul 2 08:52:48.902758 systemd[1]: Started session-7.scope. Jul 2 08:52:49.038225 kubelet[1284]: E0702 08:52:49.038146 1284 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:52:49.043001 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:52:49.043296 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:52:49.358082 sudo[1291]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 08:52:49.359352 sudo[1291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:52:49.370861 dbus-daemon[1124]: \xd0\xedR@\xdcU: received setenforce notice (enforcing=1503901584) Jul 2 08:52:49.374455 sudo[1291]: pam_unix(sudo:session): session closed for user root Jul 2 08:52:49.610876 sshd[1277]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:49.618164 systemd[1]: Started sshd@7-172.24.4.242:22-172.24.4.1:55238.service. Jul 2 08:52:49.621893 systemd[1]: sshd@6-172.24.4.242:22-172.24.4.1:55222.service: Deactivated successfully. Jul 2 08:52:49.623314 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 08:52:49.627012 systemd-logind[1131]: Session 7 logged out. Waiting for processes to exit. Jul 2 08:52:49.629342 systemd-logind[1131]: Removed session 7. Jul 2 08:52:51.040534 sshd[1294]: Accepted publickey for core from 172.24.4.1 port 55238 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:51.043580 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:51.055234 systemd[1]: Started session-8.scope. Jul 2 08:52:51.056119 systemd-logind[1131]: New session 8 of user core. Jul 2 08:52:51.542386 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 08:52:51.543718 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:52:51.551397 sudo[1299]: pam_unix(sudo:session): session closed for user root Jul 2 08:52:51.562863 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 08:52:51.563403 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:52:51.586404 systemd[1]: Stopping audit-rules.service... Jul 2 08:52:51.588000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:52:51.591248 kernel: kauditd_printk_skb: 228 callbacks suppressed Jul 2 08:52:51.591378 kernel: audit: type=1305 audit(1719910371.588:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:52:51.588000 audit[1302]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc7a595d0 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:51.597540 auditctl[1302]: No rules Jul 2 08:52:51.607518 kernel: audit: type=1300 audit(1719910371.588:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc7a595d0 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:51.608118 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 08:52:51.588000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:52:51.608577 systemd[1]: Stopped audit-rules.service. Jul 2 08:52:51.612735 kernel: audit: type=1327 audit(1719910371.588:212): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:52:51.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.616661 systemd[1]: Starting audit-rules.service... Jul 2 08:52:51.621632 kernel: audit: type=1131 audit(1719910371.608:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.656709 augenrules[1319]: No rules Jul 2 08:52:51.658728 systemd[1]: Finished audit-rules.service. Jul 2 08:52:51.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.661234 sudo[1298]: pam_unix(sudo:session): session closed for user root Jul 2 08:52:51.660000 audit[1298]: USER_END pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.678535 kernel: audit: type=1130 audit(1719910371.658:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.678648 kernel: audit: type=1106 audit(1719910371.660:215): pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.678826 kernel: audit: type=1104 audit(1719910371.661:216): pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.661000 audit[1298]: CRED_DISP pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.824645 sshd[1294]: pam_unix(sshd:session): session closed for user core Jul 2 08:52:51.832000 audit[1294]: USER_END pid=1294 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:51.847540 kernel: audit: type=1106 audit(1719910371.832:217): pid=1294 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:51.833802 systemd[1]: Started sshd@8-172.24.4.242:22-172.24.4.1:55252.service. Jul 2 08:52:51.847921 systemd[1]: sshd@7-172.24.4.242:22-172.24.4.1:55238.service: Deactivated successfully. Jul 2 08:52:51.849821 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 08:52:51.832000 audit[1294]: CRED_DISP pid=1294 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:51.861510 kernel: audit: type=1104 audit(1719910371.832:218): pid=1294 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:51.861539 systemd-logind[1131]: Session 8 logged out. Waiting for processes to exit. Jul 2 08:52:51.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.242:22-172.24.4.1:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.871631 kernel: audit: type=1130 audit(1719910371.833:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.242:22-172.24.4.1:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.242:22-172.24.4.1:55238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:51.873062 systemd-logind[1131]: Removed session 8. Jul 2 08:52:53.410000 audit[1324]: USER_ACCT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:53.411109 sshd[1324]: Accepted publickey for core from 172.24.4.1 port 55252 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:52:53.413000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:53.414000 audit[1324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc95197a0 a2=3 a3=0 items=0 ppid=1 pid=1324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:52:53.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:52:53.416172 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:52:53.425917 systemd[1]: Started session-9.scope. Jul 2 08:52:53.426803 systemd-logind[1131]: New session 9 of user core. Jul 2 08:52:53.436000 audit[1324]: USER_START pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:53.439000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:52:53.869000 audit[1328]: USER_ACCT pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:53.870804 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 08:52:53.871000 audit[1328]: CRED_REFR pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:53.872157 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:52:53.876000 audit[1328]: USER_START pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:52:53.907877 systemd[1]: Starting coreos-metadata.service... Jul 2 08:52:59.281005 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 08:52:59.290435 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 2 08:52:59.290498 kernel: audit: type=1130 audit(1719910379.281:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.290640 kernel: audit: type=1131 audit(1719910379.281:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.281695 systemd[1]: Stopped kubelet.service. Jul 2 08:52:59.290304 systemd[1]: Starting kubelet.service... Jul 2 08:52:59.505184 systemd[1]: Started kubelet.service. Jul 2 08:52:59.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.511499 kernel: audit: type=1130 audit(1719910379.505:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:52:59.815578 kubelet[1341]: E0702 08:52:59.815529 1341 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:52:59.818261 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:52:59.818413 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:52:59.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 08:52:59.823582 kernel: audit: type=1131 audit(1719910379.818:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 08:53:00.976031 coreos-metadata[1332]: Jul 02 08:53:00.975 WARN failed to locate config-drive, using the metadata service API instead Jul 2 08:53:01.070367 coreos-metadata[1332]: Jul 02 08:53:01.070 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 2 08:53:01.281274 coreos-metadata[1332]: Jul 02 08:53:01.281 INFO Fetch successful Jul 2 08:53:01.281660 coreos-metadata[1332]: Jul 02 08:53:01.281 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Jul 2 08:53:01.300318 coreos-metadata[1332]: Jul 02 08:53:01.300 INFO Fetch successful Jul 2 08:53:01.300665 coreos-metadata[1332]: Jul 02 08:53:01.300 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Jul 2 08:53:01.315859 coreos-metadata[1332]: Jul 02 08:53:01.315 INFO Fetch successful Jul 2 08:53:01.316159 coreos-metadata[1332]: Jul 02 08:53:01.316 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Jul 2 08:53:01.329077 coreos-metadata[1332]: Jul 02 08:53:01.328 INFO Fetch successful Jul 2 08:53:01.329360 coreos-metadata[1332]: Jul 02 08:53:01.329 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Jul 2 08:53:01.345949 coreos-metadata[1332]: Jul 02 08:53:01.345 INFO Fetch successful Jul 2 08:53:01.366227 systemd[1]: Finished coreos-metadata.service. Jul 2 08:53:01.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:01.378552 kernel: audit: type=1130 audit(1719910381.367:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:03.526510 systemd[1]: Stopped kubelet.service. Jul 2 08:53:03.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:03.541516 kernel: audit: type=1130 audit(1719910383.528:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:03.538990 systemd[1]: Starting kubelet.service... Jul 2 08:53:03.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:03.553637 kernel: audit: type=1131 audit(1719910383.531:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:03.571694 systemd[1]: Reloading. Jul 2 08:53:03.689533 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-07-02T08:53:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:53:03.689568 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-07-02T08:53:03Z" level=info msg="torcx already run" Jul 2 08:53:03.879799 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:53:03.879820 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:53:03.904220 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988849 kernel: audit: type=1400 audit(1719910383.978:236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.003287 kernel: audit: type=1400 audit(1719910383.978:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.003431 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit: BPF prog-id=43 op=LOAD Jul 2 08:53:03.987000 audit: BPF prog-id=27 op=UNLOAD Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit: BPF prog-id=44 op=LOAD Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit: BPF prog-id=45 op=LOAD Jul 2 08:53:03.987000 audit: BPF prog-id=28 op=UNLOAD Jul 2 08:53:03.987000 audit: BPF prog-id=29 op=UNLOAD Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.988000 audit: BPF prog-id=46 op=LOAD Jul 2 08:53:03.988000 audit: BPF prog-id=41 op=UNLOAD Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.989000 audit: BPF prog-id=47 op=LOAD Jul 2 08:53:03.989000 audit: BPF prog-id=36 op=UNLOAD Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:03.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit: BPF prog-id=37 op=UNLOAD Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:04.007000 audit: BPF prog-id=57 op=LOAD Jul 2 08:53:04.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:04.030342 systemd[1]: Started kubelet.service. Jul 2 08:53:04.036613 systemd[1]: Stopping kubelet.service... Jul 2 08:53:04.037442 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 08:53:04.037655 systemd[1]: Stopped kubelet.service. Jul 2 08:53:04.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:04.039374 systemd[1]: Starting kubelet.service... Jul 2 08:53:04.528565 systemd[1]: Started kubelet.service. Jul 2 08:53:04.543254 kernel: kauditd_printk_skb: 359 callbacks suppressed Jul 2 08:53:04.543436 kernel: audit: type=1130 audit(1719910384.530:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:04.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:04.609428 kubelet[1462]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:53:04.609428 kubelet[1462]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 08:53:04.609428 kubelet[1462]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:53:04.609428 kubelet[1462]: I0702 08:53:04.609367 1462 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 08:53:05.223897 kubelet[1462]: I0702 08:53:05.223831 1462 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 08:53:05.223897 kubelet[1462]: I0702 08:53:05.223908 1462 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 08:53:05.224611 kubelet[1462]: I0702 08:53:05.224329 1462 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 08:53:05.270236 kubelet[1462]: I0702 08:53:05.270197 1462 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 08:53:05.293914 kubelet[1462]: I0702 08:53:05.293850 1462 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 08:53:05.302014 kubelet[1462]: I0702 08:53:05.301945 1462 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 08:53:05.302386 kubelet[1462]: I0702 08:53:05.302345 1462 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 08:53:05.303790 kubelet[1462]: I0702 08:53:05.303735 1462 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 08:53:05.303790 kubelet[1462]: I0702 08:53:05.303791 1462 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 08:53:05.309136 kubelet[1462]: I0702 08:53:05.309079 1462 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:53:05.315938 kubelet[1462]: I0702 08:53:05.315814 1462 kubelet.go:393] "Attempting to sync node with API server" Jul 2 08:53:05.315938 kubelet[1462]: I0702 08:53:05.315913 1462 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 08:53:05.316260 kubelet[1462]: I0702 08:53:05.315971 1462 kubelet.go:309] "Adding apiserver pod source" Jul 2 08:53:05.316260 kubelet[1462]: I0702 08:53:05.315997 1462 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 08:53:05.316992 kubelet[1462]: E0702 08:53:05.316924 1462 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:05.317108 kubelet[1462]: E0702 08:53:05.317031 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:05.321334 kubelet[1462]: I0702 08:53:05.321284 1462 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 08:53:05.327357 kubelet[1462]: W0702 08:53:05.327304 1462 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 08:53:05.329227 kubelet[1462]: I0702 08:53:05.329175 1462 server.go:1232] "Started kubelet" Jul 2 08:53:05.373010 kubelet[1462]: W0702 08:53:05.372934 1462 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 08:53:05.373010 kubelet[1462]: E0702 08:53:05.373009 1462 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 08:53:05.373371 kubelet[1462]: I0702 08:53:05.373065 1462 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 08:53:05.376107 kubelet[1462]: I0702 08:53:05.376046 1462 server.go:462] "Adding debug handlers to kubelet server" Jul 2 08:53:05.378797 kubelet[1462]: I0702 08:53:05.378740 1462 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 08:53:05.378000 audit[1462]: AVC avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.384173 kubelet[1462]: I0702 08:53:05.379500 1462 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 08:53:05.384173 kubelet[1462]: E0702 08:53:05.381536 1462 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 08:53:05.384173 kubelet[1462]: E0702 08:53:05.381583 1462 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 08:53:05.384173 kubelet[1462]: I0702 08:53:05.383097 1462 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 08:53:05.384173 kubelet[1462]: I0702 08:53:05.383193 1462 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 08:53:05.384173 kubelet[1462]: I0702 08:53:05.383390 1462 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 08:53:05.378000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:53:05.393438 kernel: audit: type=1400 audit(1719910385.378:317): avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.393763 kernel: audit: type=1401 audit(1719910385.378:317): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:53:05.393828 kernel: audit: type=1300 audit(1719910385.378:317): arch=c000003e syscall=188 success=no exit=-22 a0=c0006bf860 a1=c0005a5fe0 a2=c0006bf830 a3=25 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.378000 audit[1462]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006bf860 a1=c0005a5fe0 a2=c0006bf830 a3=25 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.396447 kubelet[1462]: E0702 08:53:05.396279 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de59620b0c3d0d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 329126669, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 329126669, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.397602 kubelet[1462]: W0702 08:53:05.397561 1462 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.242" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 08:53:05.397793 kubelet[1462]: E0702 08:53:05.397770 1462 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.242" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 08:53:05.399045 kubelet[1462]: I0702 08:53:05.399004 1462 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 08:53:05.399796 kubelet[1462]: I0702 08:53:05.399763 1462 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 08:53:05.400152 kubelet[1462]: I0702 08:53:05.400124 1462 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 08:53:05.401315 kubelet[1462]: E0702 08:53:05.401181 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de59620e2c4f49", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 381560137, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 381560137, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.406170 kubelet[1462]: W0702 08:53:05.406101 1462 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 08:53:05.406170 kubelet[1462]: E0702 08:53:05.406175 1462 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 08:53:05.406517 kubelet[1462]: E0702 08:53:05.406417 1462 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.242\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 08:53:05.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:53:05.419530 kernel: audit: type=1327 audit(1719910385.378:317): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:53:05.378000 audit[1462]: AVC avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.428550 kernel: audit: type=1400 audit(1719910385.378:318): avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.378000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:53:05.378000 audit[1462]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b2f440 a1=c00007b110 a2=c0006bf8f0 a3=25 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.440713 kernel: audit: type=1401 audit(1719910385.378:318): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:53:05.449738 kernel: audit: type=1300 audit(1719910385.378:318): arch=c000003e syscall=188 success=no exit=-22 a0=c000b2f440 a1=c00007b110 a2=c0006bf8f0 a3=25 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.449825 kernel: audit: type=1327 audit(1719910385.378:318): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:53:05.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:53:05.461294 kubelet[1462]: I0702 08:53:05.461195 1462 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 08:53:05.461294 kubelet[1462]: I0702 08:53:05.461224 1462 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 08:53:05.461294 kubelet[1462]: I0702 08:53:05.461261 1462 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:53:05.468982 kubelet[1462]: I0702 08:53:05.468833 1462 policy_none.go:49] "None policy: Start" Jul 2 08:53:05.469188 kubelet[1462]: E0702 08:53:05.469105 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c23c22", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.242 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458494498, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458494498, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.470059 kubelet[1462]: I0702 08:53:05.469961 1462 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 08:53:05.470059 kubelet[1462]: I0702 08:53:05.469989 1462 state_mem.go:35] "Initializing new in-memory state store" Jul 2 08:53:05.473520 kubelet[1462]: E0702 08:53:05.473410 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c24fa9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.242 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458499497, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458499497, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.481392 kubelet[1462]: E0702 08:53:05.476814 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c25cc6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.242 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458502854, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458502854, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.484721 systemd[1]: Created slice kubepods.slice. Jul 2 08:53:05.490048 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 08:53:05.494002 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 08:53:05.500580 kubelet[1462]: I0702 08:53:05.500556 1462 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 08:53:05.500795 kubelet[1462]: I0702 08:53:05.500782 1462 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 08:53:05.501085 kubelet[1462]: I0702 08:53:05.501072 1462 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 08:53:05.503423 kubelet[1462]: I0702 08:53:05.503392 1462 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.242" Jul 2 08:53:05.500000 audit[1462]: AVC avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.505712 kubelet[1462]: E0702 08:53:05.505693 1462 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.242\" not found" Jul 2 08:53:05.505995 kubelet[1462]: E0702 08:53:05.505972 1462 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.242" Jul 2 08:53:05.506440 kubelet[1462]: E0702 08:53:05.506321 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c23c22", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.242 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458494498, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 503338041, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c23c22" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.500000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:53:05.500000 audit[1462]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e12e70 a1=c000e224c8 a2=c000e12e40 a3=25 items=0 ppid=1 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.500000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:53:05.508878 kernel: audit: type=1400 audit(1719910385.500:319): avc: denied { mac_admin } for pid=1462 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:05.510184 kubelet[1462]: E0702 08:53:05.509415 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c24fa9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.242 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458499497, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 503345615, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c24fa9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.514140 kubelet[1462]: E0702 08:53:05.514004 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c25cc6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.242 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458502854, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 503349583, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c25cc6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.516890 kubelet[1462]: E0702 08:53:05.516716 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de5962158ae7a3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 505200035, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 505200035, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.516000 audit[1477]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.516000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0c3c7ee0 a2=0 a3=7ffc0c3c7ecc items=0 ppid=1462 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:53:05.518000 audit[1480]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.518000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe0349c460 a2=0 a3=7ffe0349c44c items=0 ppid=1462 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:53:05.520000 audit[1482]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.520000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec591b8e0 a2=0 a3=7ffec591b8cc items=0 ppid=1462 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:53:05.545000 audit[1487]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.545000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff02dd1b00 a2=0 a3=7fff02dd1aec items=0 ppid=1462 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:53:05.608527 kubelet[1462]: E0702 08:53:05.608421 1462 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.242\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Jul 2 08:53:05.613000 audit[1492]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.613000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc98a97b0 a2=0 a3=7ffdc98a979c items=0 ppid=1462 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 08:53:05.614501 kubelet[1462]: I0702 08:53:05.614452 1462 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 08:53:05.615000 audit[1493]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.615000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2bda9a70 a2=0 a3=7ffe2bda9a5c items=0 ppid=1462 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:53:05.616000 audit[1494]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:05.616000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2b4a40f0 a2=0 a3=7ffc2b4a40dc items=0 ppid=1462 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:53:05.616943 kubelet[1462]: I0702 08:53:05.616758 1462 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 08:53:05.616943 kubelet[1462]: I0702 08:53:05.616790 1462 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 08:53:05.616943 kubelet[1462]: I0702 08:53:05.616813 1462 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 08:53:05.617151 kubelet[1462]: E0702 08:53:05.616958 1462 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 08:53:05.618000 audit[1496]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:05.618000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdac12320 a2=0 a3=7fffdac1230c items=0 ppid=1462 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:53:05.619000 audit[1495]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.619000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc569f1ee0 a2=0 a3=7ffc569f1ecc items=0 ppid=1462 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:53:05.619000 audit[1497]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:05.619000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff733b2360 a2=0 a3=7fff733b234c items=0 ppid=1462 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:53:05.620000 audit[1498]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:05.620000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1e57e1a0 a2=0 a3=7ffd1e57e18c items=0 ppid=1462 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:53:05.621000 audit[1499]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:05.621000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9e9672c0 a2=0 a3=7fff9e9672ac items=0 ppid=1462 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:05.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:53:05.627038 kubelet[1462]: W0702 08:53:05.626995 1462 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 08:53:05.627038 kubelet[1462]: E0702 08:53:05.627032 1462 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 08:53:05.709171 kubelet[1462]: I0702 08:53:05.709108 1462 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.242" Jul 2 08:53:05.711564 kubelet[1462]: E0702 08:53:05.711515 1462 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.242" Jul 2 08:53:05.712062 kubelet[1462]: E0702 08:53:05.711916 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c23c22", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.242 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458494498, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 709019035, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c23c22" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.713963 kubelet[1462]: E0702 08:53:05.713814 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c24fa9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.242 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458499497, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 709032330, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c24fa9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:05.715169 kubelet[1462]: E0702 08:53:05.715048 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c25cc6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.242 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458502854, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 709039644, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c25cc6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:06.010233 kubelet[1462]: E0702 08:53:06.010171 1462 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.242\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Jul 2 08:53:06.113192 kubelet[1462]: I0702 08:53:06.113129 1462 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.242" Jul 2 08:53:06.114818 kubelet[1462]: E0702 08:53:06.114687 1462 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.242" Jul 2 08:53:06.115370 kubelet[1462]: E0702 08:53:06.115228 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c23c22", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.242 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458494498, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 113067338, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c23c22" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:06.117244 kubelet[1462]: E0702 08:53:06.117128 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c24fa9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.242 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458499497, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 113076274, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c24fa9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:06.118864 kubelet[1462]: E0702 08:53:06.118753 1462 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242.17de596212c25cc6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.242", UID:"172.24.4.242", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.242 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.242"}, FirstTimestamp:time.Date(2024, time.July, 2, 8, 53, 5, 458502854, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 113081995, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.242"}': 'events "172.24.4.242.17de596212c25cc6" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 08:53:06.228074 kubelet[1462]: I0702 08:53:06.227981 1462 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 08:53:06.317891 kubelet[1462]: E0702 08:53:06.317793 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:06.751228 kubelet[1462]: E0702 08:53:06.750761 1462 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.242" not found Jul 2 08:53:06.819664 kubelet[1462]: E0702 08:53:06.819614 1462 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.242\" not found" node="172.24.4.242" Jul 2 08:53:06.917525 kubelet[1462]: I0702 08:53:06.917380 1462 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.242" Jul 2 08:53:06.928283 kubelet[1462]: I0702 08:53:06.928200 1462 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.242" Jul 2 08:53:07.046169 kubelet[1462]: I0702 08:53:07.046121 1462 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 08:53:07.046876 env[1136]: time="2024-07-02T08:53:07.046753298Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 08:53:07.047592 kubelet[1462]: I0702 08:53:07.047544 1462 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 08:53:07.053000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:53:07.053000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:53:07.053771 sudo[1328]: pam_unix(sudo:session): session closed for user root Jul 2 08:53:07.318906 kubelet[1462]: E0702 08:53:07.318728 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:07.319676 kubelet[1462]: I0702 08:53:07.318818 1462 apiserver.go:52] "Watching apiserver" Jul 2 08:53:07.328382 sshd[1324]: pam_unix(sshd:session): session closed for user core Jul 2 08:53:07.330000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:53:07.331000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:53:07.332183 kubelet[1462]: I0702 08:53:07.332141 1462 topology_manager.go:215] "Topology Admit Handler" podUID="3777b30f-6d2a-4ef8-a918-8767347bf7e2" podNamespace="calico-system" podName="calico-node-tgnn4" Jul 2 08:53:07.332644 kubelet[1462]: I0702 08:53:07.332608 1462 topology_manager.go:215] "Topology Admit Handler" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" podNamespace="calico-system" podName="csi-node-driver-bbbcp" Jul 2 08:53:07.332946 kubelet[1462]: I0702 08:53:07.332915 1462 topology_manager.go:215] "Topology Admit Handler" podUID="f7493b1e-9dd4-450c-98eb-9f5dd4a77db9" podNamespace="kube-system" podName="kube-proxy-hwrzc" Jul 2 08:53:07.334981 kubelet[1462]: E0702 08:53:07.334943 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:07.335163 systemd[1]: sshd@8-172.24.4.242:22-172.24.4.1:55252.service: Deactivated successfully. Jul 2 08:53:07.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.242:22-172.24.4.1:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:53:07.337199 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 08:53:07.337805 systemd[1]: session-9.scope: Consumed 1.084s CPU time. Jul 2 08:53:07.341365 systemd-logind[1131]: Session 9 logged out. Waiting for processes to exit. Jul 2 08:53:07.346067 systemd-logind[1131]: Removed session 9. Jul 2 08:53:07.369526 systemd[1]: Created slice kubepods-besteffort-podf7493b1e_9dd4_450c_98eb_9f5dd4a77db9.slice. Jul 2 08:53:07.396427 systemd[1]: Created slice kubepods-besteffort-pod3777b30f_6d2a_4ef8_a918_8767347bf7e2.slice. Jul 2 08:53:07.402504 kubelet[1462]: I0702 08:53:07.402340 1462 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 08:53:07.411933 kubelet[1462]: I0702 08:53:07.411856 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-lib-modules\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.412295 kubelet[1462]: I0702 08:53:07.412264 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-var-lib-calico\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.412669 kubelet[1462]: I0702 08:53:07.412640 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-cni-bin-dir\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.412909 kubelet[1462]: I0702 08:53:07.412884 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-cni-net-dir\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.413222 kubelet[1462]: I0702 08:53:07.413195 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-cni-log-dir\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.413548 kubelet[1462]: I0702 08:53:07.413502 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f7493b1e-9dd4-450c-98eb-9f5dd4a77db9-kube-proxy\") pod \"kube-proxy-hwrzc\" (UID: \"f7493b1e-9dd4-450c-98eb-9f5dd4a77db9\") " pod="kube-system/kube-proxy-hwrzc" Jul 2 08:53:07.413677 kubelet[1462]: I0702 08:53:07.413589 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-xtables-lock\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.413677 kubelet[1462]: I0702 08:53:07.413655 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-policysync\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.413921 kubelet[1462]: I0702 08:53:07.413738 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a765e566-cb4f-4b77-836b-1ceb242da8b3-varrun\") pod \"csi-node-driver-bbbcp\" (UID: \"a765e566-cb4f-4b77-836b-1ceb242da8b3\") " pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:07.413921 kubelet[1462]: I0702 08:53:07.413804 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ks2sm\" (UniqueName: \"kubernetes.io/projected/a765e566-cb4f-4b77-836b-1ceb242da8b3-kube-api-access-ks2sm\") pod \"csi-node-driver-bbbcp\" (UID: \"a765e566-cb4f-4b77-836b-1ceb242da8b3\") " pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:07.413921 kubelet[1462]: I0702 08:53:07.413859 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f7493b1e-9dd4-450c-98eb-9f5dd4a77db9-xtables-lock\") pod \"kube-proxy-hwrzc\" (UID: \"f7493b1e-9dd4-450c-98eb-9f5dd4a77db9\") " pod="kube-system/kube-proxy-hwrzc" Jul 2 08:53:07.414120 kubelet[1462]: I0702 08:53:07.413915 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f7493b1e-9dd4-450c-98eb-9f5dd4a77db9-lib-modules\") pod \"kube-proxy-hwrzc\" (UID: \"f7493b1e-9dd4-450c-98eb-9f5dd4a77db9\") " pod="kube-system/kube-proxy-hwrzc" Jul 2 08:53:07.414120 kubelet[1462]: I0702 08:53:07.414004 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrh6h\" (UniqueName: \"kubernetes.io/projected/f7493b1e-9dd4-450c-98eb-9f5dd4a77db9-kube-api-access-vrh6h\") pod \"kube-proxy-hwrzc\" (UID: \"f7493b1e-9dd4-450c-98eb-9f5dd4a77db9\") " pod="kube-system/kube-proxy-hwrzc" Jul 2 08:53:07.414120 kubelet[1462]: I0702 08:53:07.414074 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3777b30f-6d2a-4ef8-a918-8767347bf7e2-tigera-ca-bundle\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.414409 kubelet[1462]: I0702 08:53:07.414130 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3777b30f-6d2a-4ef8-a918-8767347bf7e2-node-certs\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.414409 kubelet[1462]: I0702 08:53:07.414185 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-var-run-calico\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.414409 kubelet[1462]: I0702 08:53:07.414247 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3777b30f-6d2a-4ef8-a918-8767347bf7e2-flexvol-driver-host\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.414409 kubelet[1462]: I0702 08:53:07.414314 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56qm9\" (UniqueName: \"kubernetes.io/projected/3777b30f-6d2a-4ef8-a918-8767347bf7e2-kube-api-access-56qm9\") pod \"calico-node-tgnn4\" (UID: \"3777b30f-6d2a-4ef8-a918-8767347bf7e2\") " pod="calico-system/calico-node-tgnn4" Jul 2 08:53:07.414409 kubelet[1462]: I0702 08:53:07.414377 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a765e566-cb4f-4b77-836b-1ceb242da8b3-socket-dir\") pod \"csi-node-driver-bbbcp\" (UID: \"a765e566-cb4f-4b77-836b-1ceb242da8b3\") " pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:07.414994 kubelet[1462]: I0702 08:53:07.414435 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a765e566-cb4f-4b77-836b-1ceb242da8b3-kubelet-dir\") pod \"csi-node-driver-bbbcp\" (UID: \"a765e566-cb4f-4b77-836b-1ceb242da8b3\") " pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:07.414994 kubelet[1462]: I0702 08:53:07.414537 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a765e566-cb4f-4b77-836b-1ceb242da8b3-registration-dir\") pod \"csi-node-driver-bbbcp\" (UID: \"a765e566-cb4f-4b77-836b-1ceb242da8b3\") " pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:07.587284 kubelet[1462]: E0702 08:53:07.584732 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:07.587621 kubelet[1462]: W0702 08:53:07.587586 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:07.587850 kubelet[1462]: E0702 08:53:07.587820 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:07.588516 kubelet[1462]: E0702 08:53:07.588417 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:07.588516 kubelet[1462]: W0702 08:53:07.588500 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:07.588720 kubelet[1462]: E0702 08:53:07.588561 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:07.589061 kubelet[1462]: E0702 08:53:07.589035 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:07.589061 kubelet[1462]: W0702 08:53:07.589058 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:07.589220 kubelet[1462]: E0702 08:53:07.589093 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:07.589535 kubelet[1462]: E0702 08:53:07.589509 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:07.589535 kubelet[1462]: W0702 08:53:07.589534 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:07.589676 kubelet[1462]: E0702 08:53:07.589557 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:07.692070 env[1136]: time="2024-07-02T08:53:07.691942794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hwrzc,Uid:f7493b1e-9dd4-450c-98eb-9f5dd4a77db9,Namespace:kube-system,Attempt:0,}" Jul 2 08:53:07.704733 env[1136]: time="2024-07-02T08:53:07.704196130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgnn4,Uid:3777b30f-6d2a-4ef8-a918-8767347bf7e2,Namespace:calico-system,Attempt:0,}" Jul 2 08:53:08.319574 kubelet[1462]: E0702 08:53:08.319512 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:08.340531 update_engine[1132]: I0702 08:53:08.340401 1132 update_attempter.cc:509] Updating boot flags... Jul 2 08:53:08.617988 kubelet[1462]: E0702 08:53:08.617535 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:08.999574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount965279653.mount: Deactivated successfully. Jul 2 08:53:09.032659 env[1136]: time="2024-07-02T08:53:09.032553176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.038587 env[1136]: time="2024-07-02T08:53:09.038522888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.044304 env[1136]: time="2024-07-02T08:53:09.044229988Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.051419 env[1136]: time="2024-07-02T08:53:09.051361751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.054149 env[1136]: time="2024-07-02T08:53:09.054088067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.056021 env[1136]: time="2024-07-02T08:53:09.055958507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.061694 env[1136]: time="2024-07-02T08:53:09.061618308Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.063628 env[1136]: time="2024-07-02T08:53:09.063546807Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:09.292900 env[1136]: time="2024-07-02T08:53:09.292778913Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:53:09.293110 env[1136]: time="2024-07-02T08:53:09.292870565Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:53:09.293110 env[1136]: time="2024-07-02T08:53:09.292903236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:53:09.295748 env[1136]: time="2024-07-02T08:53:09.293184044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fcd34acbf7204e7713f1785c30342b6a7855ca610efa7aafe4ca513f0a74f77 pid=1533 runtime=io.containerd.runc.v2 Jul 2 08:53:09.326689 kubelet[1462]: E0702 08:53:09.325966 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:09.345830 systemd[1]: Started cri-containerd-5fcd34acbf7204e7713f1785c30342b6a7855ca610efa7aafe4ca513f0a74f77.scope. Jul 2 08:53:09.355598 env[1136]: time="2024-07-02T08:53:09.354994883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:53:09.355598 env[1136]: time="2024-07-02T08:53:09.355034477Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:53:09.355598 env[1136]: time="2024-07-02T08:53:09.355047161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:53:09.355598 env[1136]: time="2024-07-02T08:53:09.355254239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8 pid=1558 runtime=io.containerd.runc.v2 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.371000 audit: BPF prog-id=58 op=LOAD Jul 2 08:53:09.372000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.372000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1533 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566636433346163626637323034653737313366313738356333303334 Jul 2 08:53:09.372000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.372000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1533 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566636433346163626637323034653737313366313738356333303334 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit: BPF prog-id=59 op=LOAD Jul 2 08:53:09.373000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c89c0 items=0 ppid=1533 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566636433346163626637323034653737313366313738356333303334 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.373000 audit: BPF prog-id=60 op=LOAD Jul 2 08:53:09.373000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c8a08 items=0 ppid=1533 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566636433346163626637323034653737313366313738356333303334 Jul 2 08:53:09.373000 audit: BPF prog-id=60 op=UNLOAD Jul 2 08:53:09.374000 audit: BPF prog-id=59 op=UNLOAD Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.374000 audit: BPF prog-id=61 op=LOAD Jul 2 08:53:09.374000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c8e18 items=0 ppid=1533 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566636433346163626637323034653737313366313738356333303334 Jul 2 08:53:09.386942 systemd[1]: Started cri-containerd-602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8.scope. Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.403000 audit: BPF prog-id=62 op=LOAD Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1558 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326234386235363135633631643239396361386464616631326131 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1558 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326234386235363135633631643239396361386464616631326131 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.406635 env[1136]: time="2024-07-02T08:53:09.406583950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hwrzc,Uid:f7493b1e-9dd4-450c-98eb-9f5dd4a77db9,Namespace:kube-system,Attempt:0,} returns sandbox id \"5fcd34acbf7204e7713f1785c30342b6a7855ca610efa7aafe4ca513f0a74f77\"" Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.405000 audit: BPF prog-id=63 op=LOAD Jul 2 08:53:09.405000 audit[1572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001859d0 items=0 ppid=1558 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326234386235363135633631643239396361386464616631326131 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409648 env[1136]: time="2024-07-02T08:53:09.409367283Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 08:53:09.408000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.408000 audit: BPF prog-id=64 op=LOAD Jul 2 08:53:09.408000 audit[1572]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000185a18 items=0 ppid=1558 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326234386235363135633631643239396361386464616631326131 Jul 2 08:53:09.409000 audit: BPF prog-id=64 op=UNLOAD Jul 2 08:53:09.409000 audit: BPF prog-id=63 op=UNLOAD Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { perfmon } for pid=1572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit[1572]: AVC avc: denied { bpf } for pid=1572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:09.409000 audit: BPF prog-id=65 op=LOAD Jul 2 08:53:09.409000 audit[1572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000185e28 items=0 ppid=1558 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:09.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630326234386235363135633631643239396361386464616631326131 Jul 2 08:53:09.424763 env[1136]: time="2024-07-02T08:53:09.424036250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgnn4,Uid:3777b30f-6d2a-4ef8-a918-8767347bf7e2,Namespace:calico-system,Attempt:0,} returns sandbox id \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\"" Jul 2 08:53:10.326453 kubelet[1462]: E0702 08:53:10.326394 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:10.618670 kubelet[1462]: E0702 08:53:10.617847 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:11.326964 kubelet[1462]: E0702 08:53:11.326558 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:11.362977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3790693364.mount: Deactivated successfully. Jul 2 08:53:12.327670 kubelet[1462]: E0702 08:53:12.327609 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:12.547879 env[1136]: time="2024-07-02T08:53:12.547787393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:12.550149 env[1136]: time="2024-07-02T08:53:12.550100042Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:12.552599 env[1136]: time="2024-07-02T08:53:12.552552173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:12.554826 env[1136]: time="2024-07-02T08:53:12.554800883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:12.556029 env[1136]: time="2024-07-02T08:53:12.555965478Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\"" Jul 2 08:53:12.562658 env[1136]: time="2024-07-02T08:53:12.562598623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 08:53:12.565596 env[1136]: time="2024-07-02T08:53:12.565564409Z" level=info msg="CreateContainer within sandbox \"5fcd34acbf7204e7713f1785c30342b6a7855ca610efa7aafe4ca513f0a74f77\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 08:53:12.583266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4110199062.mount: Deactivated successfully. Jul 2 08:53:12.597183 env[1136]: time="2024-07-02T08:53:12.597112112Z" level=info msg="CreateContainer within sandbox \"5fcd34acbf7204e7713f1785c30342b6a7855ca610efa7aafe4ca513f0a74f77\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"21e4a33d694c1e6dc67ab09e4e377d4879c7f720e631a527cce2c4ab4964f589\"" Jul 2 08:53:12.599010 env[1136]: time="2024-07-02T08:53:12.598983735Z" level=info msg="StartContainer for \"21e4a33d694c1e6dc67ab09e4e377d4879c7f720e631a527cce2c4ab4964f589\"" Jul 2 08:53:12.617992 kubelet[1462]: E0702 08:53:12.617947 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:12.633949 systemd[1]: Started cri-containerd-21e4a33d694c1e6dc67ab09e4e377d4879c7f720e631a527cce2c4ab4964f589.scope. Jul 2 08:53:12.658585 kernel: kauditd_printk_skb: 158 callbacks suppressed Jul 2 08:53:12.658706 kernel: audit: type=1400 audit(1719910392.653:373): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f793eb17c28 items=0 ppid=1533 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653461333364363934633165366463363761623039653465333737 Jul 2 08:53:12.670044 kernel: audit: type=1300 audit(1719910392.653:373): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f793eb17c28 items=0 ppid=1533 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.670105 kernel: audit: type=1327 audit(1719910392.653:373): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653461333364363934633165366463363761623039653465333737 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.673831 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.681656 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.681701 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.687498 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.699479 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.699557 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.699578 kernel: audit: type=1400 audit(1719910392.653:374): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.653000 audit: BPF prog-id=66 op=LOAD Jul 2 08:53:12.653000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034c978 items=0 ppid=1533 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653461333364363934633165366463363761623039653465333737 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit: BPF prog-id=67 op=LOAD Jul 2 08:53:12.658000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034c9c8 items=0 ppid=1533 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653461333364363934633165366463363761623039653465333737 Jul 2 08:53:12.658000 audit: BPF prog-id=67 op=UNLOAD Jul 2 08:53:12.658000 audit: BPF prog-id=66 op=UNLOAD Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:12.658000 audit: BPF prog-id=68 op=LOAD Jul 2 08:53:12.658000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034ca58 items=0 ppid=1533 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653461333364363934633165366463363761623039653465333737 Jul 2 08:53:12.707697 env[1136]: time="2024-07-02T08:53:12.707657012Z" level=info msg="StartContainer for \"21e4a33d694c1e6dc67ab09e4e377d4879c7f720e631a527cce2c4ab4964f589\" returns successfully" Jul 2 08:53:12.770000 audit[1666]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:12.770000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf97e9d70 a2=0 a3=7ffdf97e9d5c items=0 ppid=1627 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:53:12.774000 audit[1667]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.774000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5f2d36b0 a2=0 a3=7ffc5f2d369c items=0 ppid=1627 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:53:12.776000 audit[1668]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:12.776000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9c053dd0 a2=0 a3=7ffd9c053dbc items=0 ppid=1627 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:53:12.777000 audit[1669]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.777000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc773cd7a0 a2=0 a3=7ffc773cd78c items=0 ppid=1627 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:53:12.778000 audit[1671]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.778000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe307453d0 a2=0 a3=7ffe307453bc items=0 ppid=1627 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:53:12.779000 audit[1672]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:12.779000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea7350440 a2=0 a3=7ffea735042c items=0 ppid=1627 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:53:12.875000 audit[1673]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.875000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc911b810 a2=0 a3=7fffc911b7fc items=0 ppid=1627 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:53:12.883000 audit[1675]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.883000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc1782170 a2=0 a3=7ffdc178215c items=0 ppid=1627 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 08:53:12.894000 audit[1678]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.894000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee8f212e0 a2=0 a3=7ffee8f212cc items=0 ppid=1627 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 08:53:12.897000 audit[1679]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.897000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb4b963f0 a2=0 a3=7ffdb4b963dc items=0 ppid=1627 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:53:12.904000 audit[1681]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.904000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3f41b4a0 a2=0 a3=7fff3f41b48c items=0 ppid=1627 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:53:12.908000 audit[1682]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.908000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4f9d56a0 a2=0 a3=7ffd4f9d568c items=0 ppid=1627 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:53:12.918000 audit[1684]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.918000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6fb3ba30 a2=0 a3=7ffd6fb3ba1c items=0 ppid=1627 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:53:12.928000 audit[1687]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.928000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed8fd8e40 a2=0 a3=7ffed8fd8e2c items=0 ppid=1627 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 08:53:12.932000 audit[1688]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.932000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbf2d18a0 a2=0 a3=7fffbf2d188c items=0 ppid=1627 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:53:12.940000 audit[1690]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.940000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7a614790 a2=0 a3=7ffd7a61477c items=0 ppid=1627 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:53:12.943000 audit[1691]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.943000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6b1a44c0 a2=0 a3=7ffd6b1a44ac items=0 ppid=1627 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:53:12.949000 audit[1693]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.949000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca9176ac0 a2=0 a3=7ffca9176aac items=0 ppid=1627 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:53:12.958000 audit[1696]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.958000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe72b67c60 a2=0 a3=7ffe72b67c4c items=0 ppid=1627 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:53:12.967000 audit[1699]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.967000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe89e077d0 a2=0 a3=7ffe89e077bc items=0 ppid=1627 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:53:12.970000 audit[1700]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.970000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff31423240 a2=0 a3=7fff3142322c items=0 ppid=1627 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:53:12.977000 audit[1702]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:12.977000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffee7edeb00 a2=0 a3=7ffee7edeaec items=0 ppid=1627 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:12.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:53:13.089000 audit[1707]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:13.089000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda137cbc0 a2=0 a3=7ffda137cbac items=0 ppid=1627 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:53:13.091000 audit[1708]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:13.091000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33c00380 a2=0 a3=7fff33c0036c items=0 ppid=1627 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:53:13.094000 audit[1710]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:53:13.094000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffafed17b0 a2=0 a3=7fffafed179c items=0 ppid=1627 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:53:13.118000 audit[1716]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:53:13.118000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe792af1d0 a2=0 a3=7ffe792af1bc items=0 ppid=1627 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:53:13.201000 audit[1716]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:53:13.201000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe792af1d0 a2=0 a3=7ffe792af1bc items=0 ppid=1627 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:53:13.260000 audit[1724]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.260000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe14991c90 a2=0 a3=7ffe14991c7c items=0 ppid=1627 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:53:13.266000 audit[1726]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.266000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff36f47e40 a2=0 a3=7fff36f47e2c items=0 ppid=1627 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 08:53:13.274000 audit[1729]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.274000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb8d666a0 a2=0 a3=7ffdb8d6668c items=0 ppid=1627 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 08:53:13.277000 audit[1730]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.277000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe29eea4b0 a2=0 a3=7ffe29eea49c items=0 ppid=1627 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:53:13.283000 audit[1732]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.283000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff889cf8c0 a2=0 a3=7fff889cf8ac items=0 ppid=1627 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:53:13.286000 audit[1733]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.286000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8869bf50 a2=0 a3=7fff8869bf3c items=0 ppid=1627 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:53:13.295000 audit[1735]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.295000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcdadff60 a2=0 a3=7fffcdadff4c items=0 ppid=1627 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 08:53:13.306000 audit[1738]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.306000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcd8421260 a2=0 a3=7ffcd842124c items=0 ppid=1627 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:53:13.308000 audit[1739]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.308000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2999a4c0 a2=0 a3=7fff2999a4ac items=0 ppid=1627 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:53:13.315000 audit[1741]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.315000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf91bfbc0 a2=0 a3=7ffcf91bfbac items=0 ppid=1627 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:53:13.318000 audit[1742]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.318000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefd566ef0 a2=0 a3=7ffefd566edc items=0 ppid=1627 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:53:13.324000 audit[1744]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.324000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb16ca880 a2=0 a3=7ffdb16ca86c items=0 ppid=1627 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:53:13.327948 kubelet[1462]: E0702 08:53:13.327837 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:13.336000 audit[1747]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.336000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5cba4030 a2=0 a3=7ffe5cba401c items=0 ppid=1627 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:53:13.344000 audit[1750]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.344000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd09cd16b0 a2=0 a3=7ffd09cd169c items=0 ppid=1627 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 08:53:13.349000 audit[1751]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.349000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0ee83460 a2=0 a3=7ffd0ee8344c items=0 ppid=1627 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:53:13.353000 audit[1753]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.353000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcbba2abb0 a2=0 a3=7ffcbba2ab9c items=0 ppid=1627 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:53:13.360000 audit[1756]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.360000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff035b6cf0 a2=0 a3=7fff035b6cdc items=0 ppid=1627 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:53:13.361000 audit[1757]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.361000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc976c0430 a2=0 a3=7ffc976c041c items=0 ppid=1627 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:53:13.363000 audit[1759]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.363000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd5b5626c0 a2=0 a3=7ffd5b5626ac items=0 ppid=1627 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:53:13.365000 audit[1760]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.365000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffef7f7730 a2=0 a3=7fffef7f771c items=0 ppid=1627 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:53:13.367000 audit[1762]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.367000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffecc6cd4e0 a2=0 a3=7ffecc6cd4cc items=0 ppid=1627 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:53:13.371000 audit[1765]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:53:13.371000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc8e4bf40 a2=0 a3=7ffdc8e4bf2c items=0 ppid=1627 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:53:13.374000 audit[1767]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:53:13.374000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcdb44ccd0 a2=0 a3=7ffcdb44ccbc items=0 ppid=1627 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.374000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:53:13.375000 audit[1767]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:53:13.375000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcdb44ccd0 a2=0 a3=7ffcdb44ccbc items=0 ppid=1627 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:13.375000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:53:13.663253 kubelet[1462]: E0702 08:53:13.663173 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.663253 kubelet[1462]: W0702 08:53:13.663212 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.663253 kubelet[1462]: E0702 08:53:13.663246 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.663687 kubelet[1462]: E0702 08:53:13.663566 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.663687 kubelet[1462]: W0702 08:53:13.663585 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.663687 kubelet[1462]: E0702 08:53:13.663614 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.663956 kubelet[1462]: E0702 08:53:13.663918 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.663956 kubelet[1462]: W0702 08:53:13.663947 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.664153 kubelet[1462]: E0702 08:53:13.663976 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.664293 kubelet[1462]: E0702 08:53:13.664259 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.664293 kubelet[1462]: W0702 08:53:13.664291 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.664497 kubelet[1462]: E0702 08:53:13.664320 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.664702 kubelet[1462]: E0702 08:53:13.664655 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.664702 kubelet[1462]: W0702 08:53:13.664685 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.664870 kubelet[1462]: E0702 08:53:13.664713 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.665081 kubelet[1462]: E0702 08:53:13.665026 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.665081 kubelet[1462]: W0702 08:53:13.665054 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.665081 kubelet[1462]: E0702 08:53:13.665083 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.665418 kubelet[1462]: E0702 08:53:13.665382 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.665418 kubelet[1462]: W0702 08:53:13.665413 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.665645 kubelet[1462]: E0702 08:53:13.665440 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.665799 kubelet[1462]: E0702 08:53:13.665766 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.665799 kubelet[1462]: W0702 08:53:13.665797 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.665799 kubelet[1462]: E0702 08:53:13.665824 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.666165 kubelet[1462]: E0702 08:53:13.666111 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.666165 kubelet[1462]: W0702 08:53:13.666142 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.666165 kubelet[1462]: E0702 08:53:13.666168 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.666545 kubelet[1462]: E0702 08:53:13.666493 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.666545 kubelet[1462]: W0702 08:53:13.666540 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.666744 kubelet[1462]: E0702 08:53:13.666570 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.666901 kubelet[1462]: E0702 08:53:13.666867 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.666901 kubelet[1462]: W0702 08:53:13.666900 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.667078 kubelet[1462]: E0702 08:53:13.666927 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.667278 kubelet[1462]: E0702 08:53:13.667228 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.667278 kubelet[1462]: W0702 08:53:13.667258 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.667432 kubelet[1462]: E0702 08:53:13.667287 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.667678 kubelet[1462]: E0702 08:53:13.667632 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.667678 kubelet[1462]: W0702 08:53:13.667662 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.667842 kubelet[1462]: E0702 08:53:13.667688 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.668061 kubelet[1462]: E0702 08:53:13.668003 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.668061 kubelet[1462]: W0702 08:53:13.668033 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.668061 kubelet[1462]: E0702 08:53:13.668060 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.668430 kubelet[1462]: E0702 08:53:13.668399 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.668430 kubelet[1462]: W0702 08:53:13.668430 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.668642 kubelet[1462]: E0702 08:53:13.668533 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.668850 kubelet[1462]: E0702 08:53:13.668815 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.668850 kubelet[1462]: W0702 08:53:13.668849 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.668996 kubelet[1462]: E0702 08:53:13.668876 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.669195 kubelet[1462]: E0702 08:53:13.669158 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.669195 kubelet[1462]: W0702 08:53:13.669189 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.669382 kubelet[1462]: E0702 08:53:13.669216 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.669561 kubelet[1462]: E0702 08:53:13.669530 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.669561 kubelet[1462]: W0702 08:53:13.669558 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.669730 kubelet[1462]: E0702 08:53:13.669585 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.669927 kubelet[1462]: E0702 08:53:13.669858 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.669927 kubelet[1462]: W0702 08:53:13.669889 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.669927 kubelet[1462]: E0702 08:53:13.669915 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.670224 kubelet[1462]: E0702 08:53:13.670185 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.670224 kubelet[1462]: W0702 08:53:13.670216 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.670397 kubelet[1462]: E0702 08:53:13.670242 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.760051 kubelet[1462]: E0702 08:53:13.760008 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.760051 kubelet[1462]: W0702 08:53:13.760048 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.760329 kubelet[1462]: E0702 08:53:13.760089 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.760831 kubelet[1462]: E0702 08:53:13.760800 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.760969 kubelet[1462]: W0702 08:53:13.760835 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.760969 kubelet[1462]: E0702 08:53:13.760892 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.761582 kubelet[1462]: E0702 08:53:13.761517 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.761582 kubelet[1462]: W0702 08:53:13.761546 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.761582 kubelet[1462]: E0702 08:53:13.761587 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.761929 kubelet[1462]: E0702 08:53:13.761886 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.761929 kubelet[1462]: W0702 08:53:13.761917 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.762138 kubelet[1462]: E0702 08:53:13.762070 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.762332 kubelet[1462]: E0702 08:53:13.762281 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.762332 kubelet[1462]: W0702 08:53:13.762317 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.762544 kubelet[1462]: E0702 08:53:13.762363 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.762785 kubelet[1462]: E0702 08:53:13.762754 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.762916 kubelet[1462]: W0702 08:53:13.762787 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.762916 kubelet[1462]: E0702 08:53:13.762827 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.763208 kubelet[1462]: E0702 08:53:13.763172 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.763354 kubelet[1462]: W0702 08:53:13.763211 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.763531 kubelet[1462]: E0702 08:53:13.763421 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.763792 kubelet[1462]: E0702 08:53:13.763757 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.763961 kubelet[1462]: W0702 08:53:13.763799 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.763961 kubelet[1462]: E0702 08:53:13.763851 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.764370 kubelet[1462]: E0702 08:53:13.764333 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.764537 kubelet[1462]: W0702 08:53:13.764375 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.764537 kubelet[1462]: E0702 08:53:13.764429 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.765317 kubelet[1462]: E0702 08:53:13.765260 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.765317 kubelet[1462]: W0702 08:53:13.765302 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.765702 kubelet[1462]: E0702 08:53:13.765611 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.765912 kubelet[1462]: E0702 08:53:13.765874 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.766043 kubelet[1462]: W0702 08:53:13.765916 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.766043 kubelet[1462]: E0702 08:53:13.765959 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:13.766977 kubelet[1462]: E0702 08:53:13.766943 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:13.767109 kubelet[1462]: W0702 08:53:13.766981 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:13.767109 kubelet[1462]: E0702 08:53:13.767024 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.328911 kubelet[1462]: E0702 08:53:14.328831 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:14.420045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1314101082.mount: Deactivated successfully. Jul 2 08:53:14.615072 env[1136]: time="2024-07-02T08:53:14.614823490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:14.617392 kubelet[1462]: E0702 08:53:14.617348 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:14.617861 env[1136]: time="2024-07-02T08:53:14.617835210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:14.619751 env[1136]: time="2024-07-02T08:53:14.619721850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:14.622956 env[1136]: time="2024-07-02T08:53:14.622928937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:14.624385 env[1136]: time="2024-07-02T08:53:14.624327471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 08:53:14.628176 env[1136]: time="2024-07-02T08:53:14.628136859Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 08:53:14.643226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2073856929.mount: Deactivated successfully. Jul 2 08:53:14.660570 env[1136]: time="2024-07-02T08:53:14.660527290Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666\"" Jul 2 08:53:14.661285 env[1136]: time="2024-07-02T08:53:14.661259454Z" level=info msg="StartContainer for \"d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666\"" Jul 2 08:53:14.679986 kubelet[1462]: E0702 08:53:14.679773 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.679986 kubelet[1462]: W0702 08:53:14.679825 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.679986 kubelet[1462]: E0702 08:53:14.679851 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.680401 kubelet[1462]: E0702 08:53:14.680245 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.680401 kubelet[1462]: W0702 08:53:14.680258 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.680401 kubelet[1462]: E0702 08:53:14.680294 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.680761 kubelet[1462]: E0702 08:53:14.680616 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.680761 kubelet[1462]: W0702 08:53:14.680627 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.680761 kubelet[1462]: E0702 08:53:14.680641 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.681088 kubelet[1462]: E0702 08:53:14.680931 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.681088 kubelet[1462]: W0702 08:53:14.680942 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.681088 kubelet[1462]: E0702 08:53:14.680957 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.681398 kubelet[1462]: E0702 08:53:14.681262 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.681398 kubelet[1462]: W0702 08:53:14.681273 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.681398 kubelet[1462]: E0702 08:53:14.681286 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.681717 kubelet[1462]: E0702 08:53:14.681572 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.681717 kubelet[1462]: W0702 08:53:14.681583 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.681717 kubelet[1462]: E0702 08:53:14.681599 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.682025 kubelet[1462]: E0702 08:53:14.681896 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.682025 kubelet[1462]: W0702 08:53:14.681907 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.682025 kubelet[1462]: E0702 08:53:14.681920 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.682299 kubelet[1462]: E0702 08:53:14.682189 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.682299 kubelet[1462]: W0702 08:53:14.682200 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.682299 kubelet[1462]: E0702 08:53:14.682212 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.682642 kubelet[1462]: E0702 08:53:14.682519 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.682642 kubelet[1462]: W0702 08:53:14.682531 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.682642 kubelet[1462]: E0702 08:53:14.682544 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.682917 kubelet[1462]: E0702 08:53:14.682813 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.682917 kubelet[1462]: W0702 08:53:14.682824 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.682917 kubelet[1462]: E0702 08:53:14.682837 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.683104 kubelet[1462]: E0702 08:53:14.683093 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.683174 kubelet[1462]: W0702 08:53:14.683163 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.683242 kubelet[1462]: E0702 08:53:14.683232 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.683501 kubelet[1462]: E0702 08:53:14.683490 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.683568 kubelet[1462]: W0702 08:53:14.683558 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.683640 kubelet[1462]: E0702 08:53:14.683630 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.683842 kubelet[1462]: E0702 08:53:14.683831 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.683927 kubelet[1462]: W0702 08:53:14.683916 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.683997 kubelet[1462]: E0702 08:53:14.683988 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.684190 kubelet[1462]: E0702 08:53:14.684179 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.684259 kubelet[1462]: W0702 08:53:14.684248 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.684329 kubelet[1462]: E0702 08:53:14.684320 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.684677 kubelet[1462]: E0702 08:53:14.684665 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.684745 kubelet[1462]: W0702 08:53:14.684734 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.684816 kubelet[1462]: E0702 08:53:14.684807 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.685033 kubelet[1462]: E0702 08:53:14.685022 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.685101 kubelet[1462]: W0702 08:53:14.685090 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.685169 kubelet[1462]: E0702 08:53:14.685160 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.685363 kubelet[1462]: E0702 08:53:14.685352 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.685430 kubelet[1462]: W0702 08:53:14.685419 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.685523 kubelet[1462]: E0702 08:53:14.685513 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.685714 kubelet[1462]: E0702 08:53:14.685703 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.685780 kubelet[1462]: W0702 08:53:14.685769 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.685855 kubelet[1462]: E0702 08:53:14.685846 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.686049 kubelet[1462]: E0702 08:53:14.686038 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.686117 kubelet[1462]: W0702 08:53:14.686106 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.686178 kubelet[1462]: E0702 08:53:14.686169 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.686370 kubelet[1462]: E0702 08:53:14.686359 1462 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:53:14.686441 kubelet[1462]: W0702 08:53:14.686430 1462 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:53:14.686578 kubelet[1462]: E0702 08:53:14.686568 1462 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:53:14.707488 systemd[1]: Started cri-containerd-d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666.scope. Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efdc4518718 items=0 ppid=1558 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:14.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383962663264323535353437363464616133356631633765353334 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.734000 audit: BPF prog-id=69 op=LOAD Jul 2 08:53:14.734000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002914f8 items=0 ppid=1558 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:14.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383962663264323535353437363464616133356631633765353334 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit: BPF prog-id=70 op=LOAD Jul 2 08:53:14.735000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000291548 items=0 ppid=1558 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:14.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383962663264323535353437363464616133356631633765353334 Jul 2 08:53:14.735000 audit: BPF prog-id=70 op=UNLOAD Jul 2 08:53:14.735000 audit: BPF prog-id=69 op=UNLOAD Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:14.735000 audit: BPF prog-id=71 op=LOAD Jul 2 08:53:14.735000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002915d8 items=0 ppid=1558 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:14.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383962663264323535353437363464616133356631633765353334 Jul 2 08:53:14.758350 env[1136]: time="2024-07-02T08:53:14.758293543Z" level=info msg="StartContainer for \"d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666\" returns successfully" Jul 2 08:53:14.765808 systemd[1]: cri-containerd-d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666.scope: Deactivated successfully. Jul 2 08:53:14.770000 audit: BPF prog-id=71 op=UNLOAD Jul 2 08:53:14.790136 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666-rootfs.mount: Deactivated successfully. Jul 2 08:53:15.300617 env[1136]: time="2024-07-02T08:53:15.300437897Z" level=info msg="shim disconnected" id=d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666 Jul 2 08:53:15.300617 env[1136]: time="2024-07-02T08:53:15.300592347Z" level=warning msg="cleaning up after shim disconnected" id=d789bf2d25554764daa35f1c7e5342f681f8a3cde24236e3d3b8a31faaa1e666 namespace=k8s.io Jul 2 08:53:15.301159 env[1136]: time="2024-07-02T08:53:15.300627443Z" level=info msg="cleaning up dead shim" Jul 2 08:53:15.320702 env[1136]: time="2024-07-02T08:53:15.320558467Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:53:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1870 runtime=io.containerd.runc.v2\n" Jul 2 08:53:15.330051 kubelet[1462]: E0702 08:53:15.329970 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:15.669952 env[1136]: time="2024-07-02T08:53:15.669752161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 08:53:15.709516 kubelet[1462]: I0702 08:53:15.709413 1462 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hwrzc" podStartSLOduration=6.561355108 podCreationTimestamp="2024-07-02 08:53:06 +0000 UTC" firstStartedPulling="2024-07-02 08:53:09.408604672 +0000 UTC m=+4.859650088" lastFinishedPulling="2024-07-02 08:53:12.556477308 +0000 UTC m=+8.007522724" observedRunningTime="2024-07-02 08:53:13.673204878 +0000 UTC m=+9.124250334" watchObservedRunningTime="2024-07-02 08:53:15.709227744 +0000 UTC m=+11.160273200" Jul 2 08:53:16.331128 kubelet[1462]: E0702 08:53:16.331080 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:16.618127 kubelet[1462]: E0702 08:53:16.617972 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:17.331330 kubelet[1462]: E0702 08:53:17.331181 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:18.332309 kubelet[1462]: E0702 08:53:18.332238 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:18.618078 kubelet[1462]: E0702 08:53:18.617516 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:19.332489 kubelet[1462]: E0702 08:53:19.332409 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:20.333680 kubelet[1462]: E0702 08:53:20.333636 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:20.617901 kubelet[1462]: E0702 08:53:20.617799 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:21.333887 kubelet[1462]: E0702 08:53:21.333850 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:22.334599 kubelet[1462]: E0702 08:53:22.334550 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:22.711149 kubelet[1462]: E0702 08:53:22.618090 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:22.747968 env[1136]: time="2024-07-02T08:53:22.747894649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:22.752424 env[1136]: time="2024-07-02T08:53:22.752351870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:22.755520 env[1136]: time="2024-07-02T08:53:22.755423633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:22.758722 env[1136]: time="2024-07-02T08:53:22.758658762Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:22.760521 env[1136]: time="2024-07-02T08:53:22.760423142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 08:53:22.765240 env[1136]: time="2024-07-02T08:53:22.765159106Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 08:53:22.794042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount339647656.mount: Deactivated successfully. Jul 2 08:53:22.813279 env[1136]: time="2024-07-02T08:53:22.813184609Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d\"" Jul 2 08:53:22.814768 env[1136]: time="2024-07-02T08:53:22.814671469Z" level=info msg="StartContainer for \"94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d\"" Jul 2 08:53:22.869374 systemd[1]: Started cri-containerd-94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d.scope. Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.895289 kernel: kauditd_printk_skb: 230 callbacks suppressed Jul 2 08:53:22.895349 kernel: audit: type=1400 audit(1719910402.892:437): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3dc84d7008 items=0 ppid=1558 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:22.914826 kernel: audit: type=1300 audit(1719910402.892:437): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3dc84d7008 items=0 ppid=1558 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:22.914902 kernel: audit: type=1327 audit(1719910402.892:437): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646362643566363961326538383034643136393239633937616133 Jul 2 08:53:22.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646362643566363961326538383034643136393239633937616133 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924225 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924272 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.927600 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.934543 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.934592 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.941512 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.941573 kernel: audit: type=1400 audit(1719910402.892:438): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.892000 audit: BPF prog-id=72 op=LOAD Jul 2 08:53:22.892000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cc6e8 items=0 ppid=1558 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:22.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646362643566363961326538383034643136393239633937616133 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.904000 audit: BPF prog-id=73 op=LOAD Jul 2 08:53:22.904000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cc738 items=0 ppid=1558 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:22.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646362643566363961326538383034643136393239633937616133 Jul 2 08:53:22.924000 audit: BPF prog-id=73 op=UNLOAD Jul 2 08:53:22.924000 audit: BPF prog-id=72 op=UNLOAD Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:22.924000 audit: BPF prog-id=74 op=LOAD Jul 2 08:53:22.924000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cc7c8 items=0 ppid=1558 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:22.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646362643566363961326538383034643136393239633937616133 Jul 2 08:53:22.960428 env[1136]: time="2024-07-02T08:53:22.960382013Z" level=info msg="StartContainer for \"94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d\" returns successfully" Jul 2 08:53:23.335720 kubelet[1462]: E0702 08:53:23.335649 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:24.274037 env[1136]: time="2024-07-02T08:53:24.273940213Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:53:24.276538 systemd[1]: cri-containerd-94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d.scope: Deactivated successfully. Jul 2 08:53:24.279000 audit: BPF prog-id=74 op=UNLOAD Jul 2 08:53:24.303474 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d-rootfs.mount: Deactivated successfully. Jul 2 08:53:24.337990 kubelet[1462]: E0702 08:53:24.337911 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:24.355786 kubelet[1462]: I0702 08:53:24.354042 1462 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 08:53:24.628619 systemd[1]: Created slice kubepods-besteffort-poda765e566_cb4f_4b77_836b_1ceb242da8b3.slice. Jul 2 08:53:24.696508 env[1136]: time="2024-07-02T08:53:24.696412362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bbbcp,Uid:a765e566-cb4f-4b77-836b-1ceb242da8b3,Namespace:calico-system,Attempt:0,}" Jul 2 08:53:24.998855 env[1136]: time="2024-07-02T08:53:24.998143033Z" level=info msg="shim disconnected" id=94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d Jul 2 08:53:24.998855 env[1136]: time="2024-07-02T08:53:24.998238643Z" level=warning msg="cleaning up after shim disconnected" id=94dcbd5f69a2e8804d16929c97aa3d1944767bac67ad77475b4f16ace7e7069d namespace=k8s.io Jul 2 08:53:24.998855 env[1136]: time="2024-07-02T08:53:24.998263580Z" level=info msg="cleaning up dead shim" Jul 2 08:53:25.030726 env[1136]: time="2024-07-02T08:53:25.030634663Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:53:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" Jul 2 08:53:25.144229 env[1136]: time="2024-07-02T08:53:25.144118253Z" level=error msg="Failed to destroy network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:25.146865 env[1136]: time="2024-07-02T08:53:25.146812637Z" level=error msg="encountered an error cleaning up failed sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:25.147094 env[1136]: time="2024-07-02T08:53:25.146978799Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bbbcp,Uid:a765e566-cb4f-4b77-836b-1ceb242da8b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:25.147634 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3-shm.mount: Deactivated successfully. Jul 2 08:53:25.149530 kubelet[1462]: E0702 08:53:25.149444 1462 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:25.149667 kubelet[1462]: E0702 08:53:25.149638 1462 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:25.149755 kubelet[1462]: E0702 08:53:25.149735 1462 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bbbcp" Jul 2 08:53:25.150247 kubelet[1462]: E0702 08:53:25.149998 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bbbcp_calico-system(a765e566-cb4f-4b77-836b-1ceb242da8b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bbbcp_calico-system(a765e566-cb4f-4b77-836b-1ceb242da8b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:25.316993 kubelet[1462]: E0702 08:53:25.316888 1462 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:25.338249 kubelet[1462]: E0702 08:53:25.338183 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:25.690361 kubelet[1462]: I0702 08:53:25.689979 1462 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:25.692998 env[1136]: time="2024-07-02T08:53:25.692922816Z" level=info msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" Jul 2 08:53:25.698188 env[1136]: time="2024-07-02T08:53:25.698078327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 08:53:25.762154 env[1136]: time="2024-07-02T08:53:25.762033799Z" level=error msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" failed" error="failed to destroy network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:25.762661 kubelet[1462]: E0702 08:53:25.762603 1462 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:25.762787 kubelet[1462]: E0702 08:53:25.762738 1462 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3"} Jul 2 08:53:25.762880 kubelet[1462]: E0702 08:53:25.762834 1462 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a765e566-cb4f-4b77-836b-1ceb242da8b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:53:25.763050 kubelet[1462]: E0702 08:53:25.762909 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a765e566-cb4f-4b77-836b-1ceb242da8b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bbbcp" podUID="a765e566-cb4f-4b77-836b-1ceb242da8b3" Jul 2 08:53:26.339063 kubelet[1462]: E0702 08:53:26.338978 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:27.339551 kubelet[1462]: E0702 08:53:27.339498 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:28.245247 kubelet[1462]: I0702 08:53:28.245195 1462 topology_manager.go:215] "Topology Admit Handler" podUID="3042fba1-2739-40d5-ac5f-9bfb57e4acac" podNamespace="default" podName="nginx-deployment-6d5f899847-cxc6p" Jul 2 08:53:28.257739 systemd[1]: Created slice kubepods-besteffort-pod3042fba1_2739_40d5_ac5f_9bfb57e4acac.slice. Jul 2 08:53:28.340011 kubelet[1462]: E0702 08:53:28.339932 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:28.376116 kubelet[1462]: I0702 08:53:28.376052 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4fqpv\" (UniqueName: \"kubernetes.io/projected/3042fba1-2739-40d5-ac5f-9bfb57e4acac-kube-api-access-4fqpv\") pod \"nginx-deployment-6d5f899847-cxc6p\" (UID: \"3042fba1-2739-40d5-ac5f-9bfb57e4acac\") " pod="default/nginx-deployment-6d5f899847-cxc6p" Jul 2 08:53:28.562912 env[1136]: time="2024-07-02T08:53:28.562820970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cxc6p,Uid:3042fba1-2739-40d5-ac5f-9bfb57e4acac,Namespace:default,Attempt:0,}" Jul 2 08:53:28.712395 env[1136]: time="2024-07-02T08:53:28.712338966Z" level=error msg="Failed to destroy network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:28.713753 env[1136]: time="2024-07-02T08:53:28.713707332Z" level=error msg="encountered an error cleaning up failed sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:28.713870 env[1136]: time="2024-07-02T08:53:28.713840281Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cxc6p,Uid:3042fba1-2739-40d5-ac5f-9bfb57e4acac,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:28.714909 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd-shm.mount: Deactivated successfully. Jul 2 08:53:28.716313 kubelet[1462]: E0702 08:53:28.716290 1462 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:28.716395 kubelet[1462]: E0702 08:53:28.716342 1462 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-cxc6p" Jul 2 08:53:28.716395 kubelet[1462]: E0702 08:53:28.716366 1462 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-cxc6p" Jul 2 08:53:28.716481 kubelet[1462]: E0702 08:53:28.716424 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-cxc6p_default(3042fba1-2739-40d5-ac5f-9bfb57e4acac)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-cxc6p_default(3042fba1-2739-40d5-ac5f-9bfb57e4acac)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-cxc6p" podUID="3042fba1-2739-40d5-ac5f-9bfb57e4acac" Jul 2 08:53:29.340757 kubelet[1462]: E0702 08:53:29.340691 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:29.706846 kubelet[1462]: I0702 08:53:29.706643 1462 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:29.709010 env[1136]: time="2024-07-02T08:53:29.708895369Z" level=info msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" Jul 2 08:53:29.782322 env[1136]: time="2024-07-02T08:53:29.782207096Z" level=error msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" failed" error="failed to destroy network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:53:29.783094 kubelet[1462]: E0702 08:53:29.783037 1462 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:29.783255 kubelet[1462]: E0702 08:53:29.783130 1462 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd"} Jul 2 08:53:29.783255 kubelet[1462]: E0702 08:53:29.783237 1462 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3042fba1-2739-40d5-ac5f-9bfb57e4acac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:53:29.783569 kubelet[1462]: E0702 08:53:29.783313 1462 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3042fba1-2739-40d5-ac5f-9bfb57e4acac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-cxc6p" podUID="3042fba1-2739-40d5-ac5f-9bfb57e4acac" Jul 2 08:53:30.341514 kubelet[1462]: E0702 08:53:30.341473 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:31.342014 kubelet[1462]: E0702 08:53:31.341975 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:32.343205 kubelet[1462]: E0702 08:53:32.343117 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:33.345097 kubelet[1462]: E0702 08:53:33.345038 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:34.345649 kubelet[1462]: E0702 08:53:34.345558 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:35.346563 kubelet[1462]: E0702 08:53:35.346433 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:35.557582 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3541858051.mount: Deactivated successfully. Jul 2 08:53:36.152304 env[1136]: time="2024-07-02T08:53:36.152222136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:36.155151 env[1136]: time="2024-07-02T08:53:36.155092149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:36.158051 env[1136]: time="2024-07-02T08:53:36.157963315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:36.169439 env[1136]: time="2024-07-02T08:53:36.169366684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:36.170804 env[1136]: time="2024-07-02T08:53:36.170743827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 08:53:36.210742 env[1136]: time="2024-07-02T08:53:36.210645830Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 08:53:36.246160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3933559373.mount: Deactivated successfully. Jul 2 08:53:36.254981 env[1136]: time="2024-07-02T08:53:36.254855012Z" level=info msg="CreateContainer within sandbox \"602b48b5615c61d299ca8ddaf12a10e420d852e84abad8871be35fb82441fdb8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4\"" Jul 2 08:53:36.256773 env[1136]: time="2024-07-02T08:53:36.256701996Z" level=info msg="StartContainer for \"9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4\"" Jul 2 08:53:36.296142 systemd[1]: Started cri-containerd-9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4.scope. Jul 2 08:53:36.337395 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 08:53:36.337552 kernel: audit: type=1400 audit(1719910416.326:444): avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337614 kernel: audit: type=1300 audit(1719910416.326:444): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f73a1b9d588 items=0 ppid=1558 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f73a1b9d588 items=0 ppid=1558 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:36.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613964313536396265313534386137353033303735343933623939 Jul 2 08:53:36.347403 kubelet[1462]: E0702 08:53:36.347314 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:36.347701 kernel: audit: type=1327 audit(1719910416.326:444): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613964313536396265313534386137353033303735343933623939 Jul 2 08:53:36.347739 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.354652 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.358380 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.358499 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.370609 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.370669 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.375276 kernel: audit: type=1400 audit(1719910416.326:445): avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.326000 audit: BPF prog-id=75 op=LOAD Jul 2 08:53:36.326000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000335d98 items=0 ppid=1558 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:36.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613964313536396265313534386137353033303735343933623939 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.331000 audit: BPF prog-id=76 op=LOAD Jul 2 08:53:36.331000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000335de8 items=0 ppid=1558 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:36.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613964313536396265313534386137353033303735343933623939 Jul 2 08:53:36.337000 audit: BPF prog-id=76 op=UNLOAD Jul 2 08:53:36.337000 audit: BPF prog-id=75 op=UNLOAD Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:36.337000 audit: BPF prog-id=77 op=LOAD Jul 2 08:53:36.337000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000335e78 items=0 ppid=1558 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:36.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613964313536396265313534386137353033303735343933623939 Jul 2 08:53:36.379441 env[1136]: time="2024-07-02T08:53:36.379402343Z" level=info msg="StartContainer for \"9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4\" returns successfully" Jul 2 08:53:36.581011 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 08:53:36.581280 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 08:53:36.787138 systemd[1]: run-containerd-runc-k8s.io-9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4-runc.hVyDr4.mount: Deactivated successfully. Jul 2 08:53:37.348070 kubelet[1462]: E0702 08:53:37.347940 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:38.077000 audit[2197]: AVC avc: denied { write } for pid=2197 comm="tee" name="fd" dev="proc" ino=19857 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.077000 audit[2197]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffebedba10 a2=241 a3=1b6 items=1 ppid=2170 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.077000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 08:53:38.077000 audit: PATH item=0 name="/dev/fd/63" inode=19838 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.082000 audit[2210]: AVC avc: denied { write } for pid=2210 comm="tee" name="fd" dev="proc" ino=19861 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.083000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=19109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.083000 audit[2207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe83db8a0e a2=241 a3=1b6 items=1 ppid=2172 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.083000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 08:53:38.083000 audit: PATH item=0 name="/dev/fd/63" inode=19847 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.083000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.082000 audit[2210]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea8973a0e a2=241 a3=1b6 items=1 ppid=2173 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.082000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 08:53:38.082000 audit: PATH item=0 name="/dev/fd/63" inode=19852 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.082000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.093000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=19869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.093000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff92bff9ff a2=241 a3=1b6 items=1 ppid=2180 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.093000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 08:53:38.093000 audit: PATH item=0 name="/dev/fd/63" inode=19106 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.102000 audit[2231]: AVC avc: denied { write } for pid=2231 comm="tee" name="fd" dev="proc" ino=19129 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.102000 audit[2231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3f119fe a2=241 a3=1b6 items=1 ppid=2177 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.102000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 08:53:38.102000 audit: PATH item=0 name="/dev/fd/63" inode=19120 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.102000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.104000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.104000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe04938a0f a2=241 a3=1b6 items=1 ppid=2181 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.104000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 08:53:38.104000 audit: PATH item=0 name="/dev/fd/63" inode=19117 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.109000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=19137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:53:38.109000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf8101a0e a2=241 a3=1b6 items=1 ppid=2188 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.109000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 08:53:38.109000 audit: PATH item=0 name="/dev/fd/63" inode=19873 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:53:38.109000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:53:38.349245 kubelet[1462]: E0702 08:53:38.349040 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:38.357638 kernel: Initializing XFRM netlink socket Jul 2 08:53:38.502798 systemd-networkd[971]: vxlan.calico: Link UP Jul 2 08:53:38.502808 systemd-networkd[971]: vxlan.calico: Gained carrier Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit: BPF prog-id=78 op=LOAD Jul 2 08:53:38.537000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff015f9be0 a2=70 a3=7ffb7fc5f000 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.537000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.537000 audit: BPF prog-id=78 op=UNLOAD Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit: BPF prog-id=79 op=LOAD Jul 2 08:53:38.537000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff015f9be0 a2=70 a3=6f items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.537000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.537000 audit: BPF prog-id=79 op=UNLOAD Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff015f9b90 a2=70 a3=470860 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.537000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.537000 audit: BPF prog-id=80 op=LOAD Jul 2 08:53:38.537000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff015f9b70 a2=70 a3=7fff015f9be0 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.537000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.538000 audit: BPF prog-id=80 op=UNLOAD Jul 2 08:53:38.538000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.538000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff015f9c50 a2=70 a3=0 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.538000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.538000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff015f9c40 a2=70 a3=0 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.538000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.538000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff015f9bb0 a2=70 a3=0 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff015f9c80 a2=70 a3=fe00 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff015f9c80 a2=70 a3=fe00 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.540000 audit: BPF prog-id=81 op=LOAD Jul 2 08:53:38.540000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff015f9ba0 a2=70 a3=0 items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:53:38.549000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.549000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4d435c40 a2=70 a3=ffff items=0 ppid=2193 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:53:38.549000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:38.549000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4d435b10 a2=70 a3=3 items=0 ppid=2193 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:53:38.555000 audit: BPF prog-id=81 op=UNLOAD Jul 2 08:53:38.615000 audit[2334]: NETFILTER_CFG table=raw:65 family=2 entries=19 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:38.615000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fff34f9da40 a2=0 a3=7fff34f9da2c items=0 ppid=2193 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:38.620000 audit[2335]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:38.620000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc8cf6b740 a2=0 a3=7ffc8cf6b72c items=0 ppid=2193 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:38.632000 audit[2338]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:38.633000 audit[2337]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:38.633000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc709b4a00 a2=0 a3=7ffc709b49ec items=0 ppid=2193 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.633000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:38.632000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd911753f0 a2=0 a3=7ffd911753dc items=0 ppid=2193 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:38.632000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:39.350174 kubelet[1462]: E0702 08:53:39.350125 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:39.936723 systemd-networkd[971]: vxlan.calico: Gained IPv6LL Jul 2 08:53:40.352145 kubelet[1462]: E0702 08:53:40.352084 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:40.619001 env[1136]: time="2024-07-02T08:53:40.618795136Z" level=info msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" Jul 2 08:53:40.782593 kubelet[1462]: I0702 08:53:40.781911 1462 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tgnn4" podStartSLOduration=8.036296476 podCreationTimestamp="2024-07-02 08:53:06 +0000 UTC" firstStartedPulling="2024-07-02 08:53:09.425858419 +0000 UTC m=+4.876903835" lastFinishedPulling="2024-07-02 08:53:36.171390379 +0000 UTC m=+31.622435836" observedRunningTime="2024-07-02 08:53:36.752687906 +0000 UTC m=+32.203733322" watchObservedRunningTime="2024-07-02 08:53:40.781828477 +0000 UTC m=+36.232873933" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.782 [INFO][2362] k8s.go 608: Cleaning up netns ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.802 [INFO][2362] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" iface="eth0" netns="/var/run/netns/cni-d1a523cc-e606-6d0c-3a9e-1fea2a718b09" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.802 [INFO][2362] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" iface="eth0" netns="/var/run/netns/cni-d1a523cc-e606-6d0c-3a9e-1fea2a718b09" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.813 [INFO][2362] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" iface="eth0" netns="/var/run/netns/cni-d1a523cc-e606-6d0c-3a9e-1fea2a718b09" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.813 [INFO][2362] k8s.go 615: Releasing IP address(es) ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:40.813 [INFO][2362] utils.go 188: Calico CNI releasing IP address ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.123 [INFO][2368] ipam_plugin.go 411: Releasing address using handleID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.123 [INFO][2368] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.124 [INFO][2368] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.139 [WARNING][2368] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.139 [INFO][2368] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.142 [INFO][2368] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:53:41.147377 env[1136]: 2024-07-02 08:53:41.144 [INFO][2362] k8s.go 621: Teardown processing complete. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:53:41.151992 systemd[1]: run-netns-cni\x2dd1a523cc\x2de606\x2d6d0c\x2d3a9e\x2d1fea2a718b09.mount: Deactivated successfully. Jul 2 08:53:41.155048 env[1136]: time="2024-07-02T08:53:41.153655348Z" level=info msg="TearDown network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" successfully" Jul 2 08:53:41.155048 env[1136]: time="2024-07-02T08:53:41.153746899Z" level=info msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" returns successfully" Jul 2 08:53:41.156275 env[1136]: time="2024-07-02T08:53:41.156193718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bbbcp,Uid:a765e566-cb4f-4b77-836b-1ceb242da8b3,Namespace:calico-system,Attempt:1,}" Jul 2 08:53:41.353593 kubelet[1462]: E0702 08:53:41.353514 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:41.367278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:53:41.367452 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7622a954a2a: link becomes ready Jul 2 08:53:41.368927 systemd-networkd[971]: cali7622a954a2a: Link UP Jul 2 08:53:41.369314 systemd-networkd[971]: cali7622a954a2a: Gained carrier Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.267 [INFO][2375] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.242-k8s-csi--node--driver--bbbcp-eth0 csi-node-driver- calico-system a765e566-cb4f-4b77-836b-1ceb242da8b3 1123 0 2024-07-02 08:53:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.242 csi-node-driver-bbbcp eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7622a954a2a [] []}} ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.267 [INFO][2375] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.299 [INFO][2386] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" HandleID="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.316 [INFO][2386] ipam_plugin.go 264: Auto assigning IP ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" HandleID="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312360), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.242", "pod":"csi-node-driver-bbbcp", "timestamp":"2024-07-02 08:53:41.299379683 +0000 UTC"}, Hostname:"172.24.4.242", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.316 [INFO][2386] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.316 [INFO][2386] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.316 [INFO][2386] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.242' Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.319 [INFO][2386] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.325 [INFO][2386] ipam.go 372: Looking up existing affinities for host host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.331 [INFO][2386] ipam.go 489: Trying affinity for 192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.334 [INFO][2386] ipam.go 155: Attempting to load block cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.337 [INFO][2386] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.338 [INFO][2386] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.341 [INFO][2386] ipam.go 1685: Creating new handle: k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.348 [INFO][2386] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.359 [INFO][2386] ipam.go 1216: Successfully claimed IPs: [192.168.76.1/26] block=192.168.76.0/26 handle="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.359 [INFO][2386] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.1/26] handle="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" host="172.24.4.242" Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.360 [INFO][2386] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:53:41.392722 env[1136]: 2024-07-02 08:53:41.360 [INFO][2386] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.76.1/26] IPv6=[] ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" HandleID="k8s-pod-network.b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.362 [INFO][2375] k8s.go 386: Populated endpoint ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-csi--node--driver--bbbcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a765e566-cb4f-4b77-836b-1ceb242da8b3", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"", Pod:"csi-node-driver-bbbcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7622a954a2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.363 [INFO][2375] k8s.go 387: Calico CNI using IPs: [192.168.76.1/32] ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.363 [INFO][2375] dataplane_linux.go 68: Setting the host side veth name to cali7622a954a2a ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.367 [INFO][2375] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.368 [INFO][2375] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-csi--node--driver--bbbcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a765e566-cb4f-4b77-836b-1ceb242da8b3", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad", Pod:"csi-node-driver-bbbcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7622a954a2a", MAC:"52:27:f3:25:ef:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:53:41.394524 env[1136]: 2024-07-02 08:53:41.386 [INFO][2375] k8s.go 500: Wrote updated endpoint to datastore ContainerID="b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad" Namespace="calico-system" Pod="csi-node-driver-bbbcp" WorkloadEndpoint="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:53:41.421000 audit[2418]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:41.422743 env[1136]: time="2024-07-02T08:53:41.421535731Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:53:41.422743 env[1136]: time="2024-07-02T08:53:41.421604350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:53:41.422743 env[1136]: time="2024-07-02T08:53:41.421628545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:53:41.423527 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 08:53:41.423586 kernel: audit: type=1325 audit(1719910421.421:477): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:41.421000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd9e8f6c30 a2=0 a3=7ffd9e8f6c1c items=0 ppid=2193 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:41.440564 kernel: audit: type=1300 audit(1719910421.421:477): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd9e8f6c30 a2=0 a3=7ffd9e8f6c1c items=0 ppid=2193 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.440621 kernel: audit: type=1327 audit(1719910421.421:477): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:41.440655 env[1136]: time="2024-07-02T08:53:41.421817450Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad pid=2412 runtime=io.containerd.runc.v2 Jul 2 08:53:41.458192 systemd[1]: Started cri-containerd-b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad.scope. Jul 2 08:53:41.478741 kernel: audit: type=1400 audit(1719910421.471:478): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478842 kernel: audit: type=1400 audit(1719910421.471:479): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.484708 kernel: audit: type=1400 audit(1719910421.471:480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.488485 kernel: audit: type=1400 audit(1719910421.471:481): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.493476 kernel: audit: type=1400 audit(1719910421.471:482): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.501631 kernel: audit: type=1400 audit(1719910421.471:483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.501693 kernel: audit: type=1400 audit(1719910421.471:484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit: BPF prog-id=82 op=LOAD Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2412 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236313833336634626636633865653566373262363766626561343239 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2412 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236313833336634626636633865653566373262363766626561343239 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.478000 audit: BPF prog-id=83 op=LOAD Jul 2 08:53:41.478000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bd10 items=0 ppid=2412 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236313833336634626636633865653566373262363766626561343239 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit: BPF prog-id=84 op=LOAD Jul 2 08:53:41.479000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bd58 items=0 ppid=2412 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236313833336634626636633865653566373262363766626561343239 Jul 2 08:53:41.479000 audit: BPF prog-id=84 op=UNLOAD Jul 2 08:53:41.479000 audit: BPF prog-id=83 op=UNLOAD Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:41.479000 audit: BPF prog-id=85 op=LOAD Jul 2 08:53:41.479000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00037c168 items=0 ppid=2412 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:41.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236313833336634626636633865653566373262363766626561343239 Jul 2 08:53:41.514774 env[1136]: time="2024-07-02T08:53:41.514728546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bbbcp,Uid:a765e566-cb4f-4b77-836b-1ceb242da8b3,Namespace:calico-system,Attempt:1,} returns sandbox id \"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad\"" Jul 2 08:53:41.516831 env[1136]: time="2024-07-02T08:53:41.516802627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 08:53:42.152326 systemd[1]: run-containerd-runc-k8s.io-b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad-runc.R5FJxl.mount: Deactivated successfully. Jul 2 08:53:42.354401 kubelet[1462]: E0702 08:53:42.354256 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:42.945874 systemd-networkd[971]: cali7622a954a2a: Gained IPv6LL Jul 2 08:53:43.354661 kubelet[1462]: E0702 08:53:43.354580 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:43.651270 env[1136]: time="2024-07-02T08:53:43.619885721Z" level=info msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" Jul 2 08:53:43.743706 env[1136]: time="2024-07-02T08:53:43.743637932Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:43.748375 env[1136]: time="2024-07-02T08:53:43.748280709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:43.751925 env[1136]: time="2024-07-02T08:53:43.751871935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:43.756872 env[1136]: time="2024-07-02T08:53:43.756808153Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:43.758086 env[1136]: time="2024-07-02T08:53:43.758031237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 08:53:43.761858 env[1136]: time="2024-07-02T08:53:43.761792362Z" level=info msg="CreateContainer within sandbox \"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 08:53:43.794909 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1628406466.mount: Deactivated successfully. Jul 2 08:53:43.812245 env[1136]: time="2024-07-02T08:53:43.812169511Z" level=info msg="CreateContainer within sandbox \"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e2311ba8ea49b1acf400dea002f4a415f441678ba44fbe1419a4e4687be497a5\"" Jul 2 08:53:43.813920 env[1136]: time="2024-07-02T08:53:43.813850974Z" level=info msg="StartContainer for \"e2311ba8ea49b1acf400dea002f4a415f441678ba44fbe1419a4e4687be497a5\"" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.780 [INFO][2469] k8s.go 608: Cleaning up netns ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.781 [INFO][2469] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" iface="eth0" netns="/var/run/netns/cni-0c3815d0-43d7-a49f-75a1-6afbf584d049" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.794 [INFO][2469] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" iface="eth0" netns="/var/run/netns/cni-0c3815d0-43d7-a49f-75a1-6afbf584d049" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.797 [INFO][2469] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" iface="eth0" netns="/var/run/netns/cni-0c3815d0-43d7-a49f-75a1-6afbf584d049" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.797 [INFO][2469] k8s.go 615: Releasing IP address(es) ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.797 [INFO][2469] utils.go 188: Calico CNI releasing IP address ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.836 [INFO][2478] ipam_plugin.go 411: Releasing address using handleID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.836 [INFO][2478] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.836 [INFO][2478] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.849 [WARNING][2478] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.849 [INFO][2478] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.851 [INFO][2478] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:53:43.860438 env[1136]: 2024-07-02 08:53:43.858 [INFO][2469] k8s.go 621: Teardown processing complete. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:53:43.862167 env[1136]: time="2024-07-02T08:53:43.861694180Z" level=info msg="TearDown network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" successfully" Jul 2 08:53:43.862167 env[1136]: time="2024-07-02T08:53:43.861726912Z" level=info msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" returns successfully" Jul 2 08:53:43.863847 systemd[1]: Started cri-containerd-e2311ba8ea49b1acf400dea002f4a415f441678ba44fbe1419a4e4687be497a5.scope. Jul 2 08:53:43.864950 env[1136]: time="2024-07-02T08:53:43.864911795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cxc6p,Uid:3042fba1-2739-40d5-ac5f-9bfb57e4acac,Namespace:default,Attempt:1,}" Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f13743f5608 items=0 ppid=2412 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:43.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333131626138656134396231616366343030646561303032663461 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.885000 audit: BPF prog-id=86 op=LOAD Jul 2 08:53:43.885000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000396f38 items=0 ppid=2412 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:43.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333131626138656134396231616366343030646561303032663461 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.887000 audit: BPF prog-id=87 op=LOAD Jul 2 08:53:43.887000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000396f88 items=0 ppid=2412 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:43.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333131626138656134396231616366343030646561303032663461 Jul 2 08:53:43.888000 audit: BPF prog-id=87 op=UNLOAD Jul 2 08:53:43.888000 audit: BPF prog-id=86 op=UNLOAD Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:43.888000 audit: BPF prog-id=88 op=LOAD Jul 2 08:53:43.888000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000397018 items=0 ppid=2412 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:43.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333131626138656134396231616366343030646561303032663461 Jul 2 08:53:43.912528 env[1136]: time="2024-07-02T08:53:43.912402428Z" level=info msg="StartContainer for \"e2311ba8ea49b1acf400dea002f4a415f441678ba44fbe1419a4e4687be497a5\" returns successfully" Jul 2 08:53:43.915156 env[1136]: time="2024-07-02T08:53:43.915121619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 08:53:44.077320 systemd-networkd[971]: cali4b83c1dbad9: Link UP Jul 2 08:53:44.084975 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:53:44.085901 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4b83c1dbad9: link becomes ready Jul 2 08:53:44.085320 systemd-networkd[971]: cali4b83c1dbad9: Gained carrier Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:43.952 [INFO][2516] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0 nginx-deployment-6d5f899847- default 3042fba1-2739-40d5-ac5f-9bfb57e4acac 1135 0 2024-07-02 08:53:28 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.242 nginx-deployment-6d5f899847-cxc6p eth0 default [] [] [kns.default ksa.default.default] cali4b83c1dbad9 [] []}} ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:43.953 [INFO][2516] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:43.990 [INFO][2531] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" HandleID="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.008 [INFO][2531] ipam_plugin.go 264: Auto assigning IP ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" HandleID="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efde0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.242", "pod":"nginx-deployment-6d5f899847-cxc6p", "timestamp":"2024-07-02 08:53:43.990366459 +0000 UTC"}, Hostname:"172.24.4.242", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.008 [INFO][2531] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.008 [INFO][2531] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.008 [INFO][2531] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.242' Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.011 [INFO][2531] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.021 [INFO][2531] ipam.go 372: Looking up existing affinities for host host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.034 [INFO][2531] ipam.go 489: Trying affinity for 192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.038 [INFO][2531] ipam.go 155: Attempting to load block cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.043 [INFO][2531] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.043 [INFO][2531] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.046 [INFO][2531] ipam.go 1685: Creating new handle: k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39 Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.053 [INFO][2531] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.065 [INFO][2531] ipam.go 1216: Successfully claimed IPs: [192.168.76.2/26] block=192.168.76.0/26 handle="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.066 [INFO][2531] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.2/26] handle="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" host="172.24.4.242" Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.066 [INFO][2531] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:53:44.107171 env[1136]: 2024-07-02 08:53:44.066 [INFO][2531] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.76.2/26] IPv6=[] ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" HandleID="k8s-pod-network.dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.069 [INFO][2516] k8s.go 386: Populated endpoint ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3042fba1-2739-40d5-ac5f-9bfb57e4acac", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"", Pod:"nginx-deployment-6d5f899847-cxc6p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4b83c1dbad9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.070 [INFO][2516] k8s.go 387: Calico CNI using IPs: [192.168.76.2/32] ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.070 [INFO][2516] dataplane_linux.go 68: Setting the host side veth name to cali4b83c1dbad9 ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.087 [INFO][2516] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.088 [INFO][2516] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3042fba1-2739-40d5-ac5f-9bfb57e4acac", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39", Pod:"nginx-deployment-6d5f899847-cxc6p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4b83c1dbad9", MAC:"76:39:8d:be:83:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:53:44.114170 env[1136]: 2024-07-02 08:53:44.104 [INFO][2516] k8s.go 500: Wrote updated endpoint to datastore ContainerID="dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39" Namespace="default" Pod="nginx-deployment-6d5f899847-cxc6p" WorkloadEndpoint="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:53:44.141000 audit[2552]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:53:44.141000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffdf87fa560 a2=0 a3=7ffdf87fa54c items=0 ppid=2193 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:53:44.154203 env[1136]: time="2024-07-02T08:53:44.154068700Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:53:44.154545 env[1136]: time="2024-07-02T08:53:44.154160583Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:53:44.154545 env[1136]: time="2024-07-02T08:53:44.154193865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:53:44.155138 env[1136]: time="2024-07-02T08:53:44.155041956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39 pid=2560 runtime=io.containerd.runc.v2 Jul 2 08:53:44.181958 systemd[1]: Started cri-containerd-dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39.scope. Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.198000 audit: BPF prog-id=89 op=LOAD Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353965616536316534343864343039376436663666616631666435 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353965616536316534343864343039376436663666616631666435 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit: BPF prog-id=90 op=LOAD Jul 2 08:53:44.199000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000319330 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353965616536316534343864343039376436663666616631666435 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit: BPF prog-id=91 op=LOAD Jul 2 08:53:44.199000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000319378 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353965616536316534343864343039376436663666616631666435 Jul 2 08:53:44.199000 audit: BPF prog-id=91 op=UNLOAD Jul 2 08:53:44.199000 audit: BPF prog-id=90 op=UNLOAD Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:44.199000 audit: BPF prog-id=92 op=LOAD Jul 2 08:53:44.199000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000319788 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:44.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353965616536316534343864343039376436663666616631666435 Jul 2 08:53:44.226664 env[1136]: time="2024-07-02T08:53:44.226625488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cxc6p,Uid:3042fba1-2739-40d5-ac5f-9bfb57e4acac,Namespace:default,Attempt:1,} returns sandbox id \"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39\"" Jul 2 08:53:44.355750 kubelet[1462]: E0702 08:53:44.355643 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:44.791433 systemd[1]: run-containerd-runc-k8s.io-e2311ba8ea49b1acf400dea002f4a415f441678ba44fbe1419a4e4687be497a5-runc.gSOrrg.mount: Deactivated successfully. Jul 2 08:53:44.791990 systemd[1]: run-netns-cni\x2d0c3815d0\x2d43d7\x2da49f\x2d75a1\x2d6afbf584d049.mount: Deactivated successfully. Jul 2 08:53:45.316621 kubelet[1462]: E0702 08:53:45.316543 1462 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:45.356296 kubelet[1462]: E0702 08:53:45.356208 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:45.809776 env[1136]: time="2024-07-02T08:53:45.809698343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:45.812234 env[1136]: time="2024-07-02T08:53:45.812176180Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:45.819185 env[1136]: time="2024-07-02T08:53:45.819121366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:45.821201 env[1136]: time="2024-07-02T08:53:45.821156173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:45.821590 env[1136]: time="2024-07-02T08:53:45.821543510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 08:53:45.826897 env[1136]: time="2024-07-02T08:53:45.826845574Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 08:53:45.828027 env[1136]: time="2024-07-02T08:53:45.827927733Z" level=info msg="CreateContainer within sandbox \"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 08:53:45.859607 env[1136]: time="2024-07-02T08:53:45.859430560Z" level=info msg="CreateContainer within sandbox \"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fcb315e0aa3eb564cce62fa502b190774df7748b7b0cb26b96cdde59b8e839d3\"" Jul 2 08:53:45.861140 env[1136]: time="2024-07-02T08:53:45.861064165Z" level=info msg="StartContainer for \"fcb315e0aa3eb564cce62fa502b190774df7748b7b0cb26b96cdde59b8e839d3\"" Jul 2 08:53:45.905963 systemd[1]: Started cri-containerd-fcb315e0aa3eb564cce62fa502b190774df7748b7b0cb26b96cdde59b8e839d3.scope. Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb6351882f8 items=0 ppid=2412 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:45.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623331356530616133656235363463636536326661353032623139 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit: BPF prog-id=93 op=LOAD Jul 2 08:53:45.927000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024278 items=0 ppid=2412 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:45.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623331356530616133656235363463636536326661353032623139 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit: BPF prog-id=94 op=LOAD Jul 2 08:53:45.927000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000242c8 items=0 ppid=2412 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:45.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623331356530616133656235363463636536326661353032623139 Jul 2 08:53:45.927000 audit: BPF prog-id=94 op=UNLOAD Jul 2 08:53:45.927000 audit: BPF prog-id=93 op=UNLOAD Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:45.927000 audit: BPF prog-id=95 op=LOAD Jul 2 08:53:45.927000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024358 items=0 ppid=2412 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:45.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663623331356530616133656235363463636536326661353032623139 Jul 2 08:53:46.032373 env[1136]: time="2024-07-02T08:53:46.032284645Z" level=info msg="StartContainer for \"fcb315e0aa3eb564cce62fa502b190774df7748b7b0cb26b96cdde59b8e839d3\" returns successfully" Jul 2 08:53:46.145952 systemd-networkd[971]: cali4b83c1dbad9: Gained IPv6LL Jul 2 08:53:46.357189 kubelet[1462]: E0702 08:53:46.357088 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:46.537133 kubelet[1462]: I0702 08:53:46.536549 1462 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 08:53:46.537133 kubelet[1462]: I0702 08:53:46.536609 1462 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 08:53:46.860113 kubelet[1462]: I0702 08:53:46.859398 1462 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-bbbcp" podStartSLOduration=36.552266827 podCreationTimestamp="2024-07-02 08:53:06 +0000 UTC" firstStartedPulling="2024-07-02 08:53:41.516157307 +0000 UTC m=+36.967202713" lastFinishedPulling="2024-07-02 08:53:45.823235764 +0000 UTC m=+41.274281220" observedRunningTime="2024-07-02 08:53:46.858178655 +0000 UTC m=+42.309224112" watchObservedRunningTime="2024-07-02 08:53:46.859345334 +0000 UTC m=+42.310390820" Jul 2 08:53:47.358298 kubelet[1462]: E0702 08:53:47.358255 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:48.359270 kubelet[1462]: E0702 08:53:48.359150 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:49.359885 kubelet[1462]: E0702 08:53:49.359747 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:50.322818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount264188899.mount: Deactivated successfully. Jul 2 08:53:50.360686 kubelet[1462]: E0702 08:53:50.360617 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:51.361669 kubelet[1462]: E0702 08:53:51.361581 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:52.362591 kubelet[1462]: E0702 08:53:52.362543 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:53.225021 env[1136]: time="2024-07-02T08:53:53.224917286Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:53.228005 env[1136]: time="2024-07-02T08:53:53.227941608Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:53.231132 env[1136]: time="2024-07-02T08:53:53.231065828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:53.234583 env[1136]: time="2024-07-02T08:53:53.234524295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:53:53.236859 env[1136]: time="2024-07-02T08:53:53.236804341Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 08:53:53.240915 env[1136]: time="2024-07-02T08:53:53.240854538Z" level=info msg="CreateContainer within sandbox \"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 08:53:53.270564 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3638371342.mount: Deactivated successfully. Jul 2 08:53:53.288914 env[1136]: time="2024-07-02T08:53:53.288831201Z" level=info msg="CreateContainer within sandbox \"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"bf58034dc39bcc06a304b1d2557dc68b4ca9a154393d58f2b8e4b27ddd6bd71a\"" Jul 2 08:53:53.290838 env[1136]: time="2024-07-02T08:53:53.290737616Z" level=info msg="StartContainer for \"bf58034dc39bcc06a304b1d2557dc68b4ca9a154393d58f2b8e4b27ddd6bd71a\"" Jul 2 08:53:53.336964 systemd[1]: Started cri-containerd-bf58034dc39bcc06a304b1d2557dc68b4ca9a154393d58f2b8e4b27ddd6bd71a.scope. Jul 2 08:53:53.363121 kubelet[1462]: E0702 08:53:53.362975 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:53.370500 kernel: kauditd_printk_skb: 196 callbacks suppressed Jul 2 08:53:53.370647 kernel: audit: type=1400 audit(1719910433.364:527): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.370678 kernel: audit: type=1400 audit(1719910433.364:528): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378520 kernel: audit: type=1400 audit(1719910433.364:529): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.386599 kernel: audit: type=1400 audit(1719910433.364:530): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.386724 kernel: audit: type=1400 audit(1719910433.364:531): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.386752 kernel: audit: type=1400 audit(1719910433.364:532): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.394683 kernel: audit: type=1400 audit(1719910433.364:533): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.394915 kernel: audit: type=1400 audit(1719910433.364:534): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.404568 kernel: audit: type=1400 audit(1719910433.364:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.369000 audit: BPF prog-id=96 op=LOAD Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2560 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353830333464633339626363303661333034623164323535376463 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2560 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353830333464633339626363303661333034623164323535376463 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.409570 kernel: audit: type=1400 audit(1719910433.369:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.373000 audit: BPF prog-id=97 op=LOAD Jul 2 08:53:53.373000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c05f0 items=0 ppid=2560 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353830333464633339626363303661333034623164323535376463 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.378000 audit: BPF prog-id=98 op=LOAD Jul 2 08:53:53.378000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0638 items=0 ppid=2560 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:53.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353830333464633339626363303661333034623164323535376463 Jul 2 08:53:53.378000 audit: BPF prog-id=98 op=UNLOAD Jul 2 08:53:53.378000 audit: BPF prog-id=97 op=UNLOAD Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:53:53.382000 audit: BPF prog-id=99 op=LOAD Jul 2 08:53:53.382000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0a48 items=0 ppid=2560 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:53:53.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353830333464633339626363303661333034623164323535376463 Jul 2 08:53:53.479442 env[1136]: time="2024-07-02T08:53:53.479297271Z" level=info msg="StartContainer for \"bf58034dc39bcc06a304b1d2557dc68b4ca9a154393d58f2b8e4b27ddd6bd71a\" returns successfully" Jul 2 08:53:53.823452 kubelet[1462]: I0702 08:53:53.823359 1462 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-cxc6p" podStartSLOduration=16.813778429 podCreationTimestamp="2024-07-02 08:53:28 +0000 UTC" firstStartedPulling="2024-07-02 08:53:44.227971202 +0000 UTC m=+39.679016608" lastFinishedPulling="2024-07-02 08:53:53.237434463 +0000 UTC m=+48.688479919" observedRunningTime="2024-07-02 08:53:53.822620254 +0000 UTC m=+49.273665710" watchObservedRunningTime="2024-07-02 08:53:53.82324174 +0000 UTC m=+49.274287206" Jul 2 08:53:54.364259 kubelet[1462]: E0702 08:53:54.364174 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:55.364743 kubelet[1462]: E0702 08:53:55.364631 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:56.366453 kubelet[1462]: E0702 08:53:56.366387 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:57.367489 kubelet[1462]: E0702 08:53:57.367398 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:58.369107 kubelet[1462]: E0702 08:53:58.368984 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:53:59.369489 kubelet[1462]: E0702 08:53:59.369375 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:00.370594 kubelet[1462]: E0702 08:54:00.370502 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:01.371257 kubelet[1462]: E0702 08:54:01.371209 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:02.373226 kubelet[1462]: E0702 08:54:02.373092 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:03.373561 kubelet[1462]: E0702 08:54:03.373504 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:04.373863 kubelet[1462]: E0702 08:54:04.373799 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:05.316382 kubelet[1462]: E0702 08:54:05.316273 1462 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:05.375022 kubelet[1462]: E0702 08:54:05.374926 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:05.387334 env[1136]: time="2024-07-02T08:54:05.387276620Z" level=info msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.467 [WARNING][2751] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-csi--node--driver--bbbcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a765e566-cb4f-4b77-836b-1ceb242da8b3", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad", Pod:"csi-node-driver-bbbcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7622a954a2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.468 [INFO][2751] k8s.go 608: Cleaning up netns ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.468 [INFO][2751] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" iface="eth0" netns="" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.468 [INFO][2751] k8s.go 615: Releasing IP address(es) ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.468 [INFO][2751] utils.go 188: Calico CNI releasing IP address ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.533 [INFO][2758] ipam_plugin.go 411: Releasing address using handleID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.533 [INFO][2758] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.533 [INFO][2758] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.553 [WARNING][2758] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.553 [INFO][2758] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.556 [INFO][2758] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:05.562144 env[1136]: 2024-07-02 08:54:05.559 [INFO][2751] k8s.go 621: Teardown processing complete. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.563499 env[1136]: time="2024-07-02T08:54:05.563401135Z" level=info msg="TearDown network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" successfully" Jul 2 08:54:05.563747 env[1136]: time="2024-07-02T08:54:05.563663987Z" level=info msg="StopPodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" returns successfully" Jul 2 08:54:05.565421 env[1136]: time="2024-07-02T08:54:05.565347917Z" level=info msg="RemovePodSandbox for \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" Jul 2 08:54:05.565627 env[1136]: time="2024-07-02T08:54:05.565450759Z" level=info msg="Forcibly stopping sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\"" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.662 [WARNING][2779] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-csi--node--driver--bbbcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a765e566-cb4f-4b77-836b-1ceb242da8b3", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"b61833f4bf6c8ee5f72b67fbea4293ee33de805c2dff1c559d023c28a579c7ad", Pod:"csi-node-driver-bbbcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7622a954a2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.662 [INFO][2779] k8s.go 608: Cleaning up netns ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.662 [INFO][2779] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" iface="eth0" netns="" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.662 [INFO][2779] k8s.go 615: Releasing IP address(es) ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.662 [INFO][2779] utils.go 188: Calico CNI releasing IP address ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.708 [INFO][2789] ipam_plugin.go 411: Releasing address using handleID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.708 [INFO][2789] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.708 [INFO][2789] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.719 [WARNING][2789] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.720 [INFO][2789] ipam_plugin.go 439: Releasing address using workloadID ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" HandleID="k8s-pod-network.f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Workload="172.24.4.242-k8s-csi--node--driver--bbbcp-eth0" Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.723 [INFO][2789] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:05.729644 env[1136]: 2024-07-02 08:54:05.725 [INFO][2779] k8s.go 621: Teardown processing complete. ContainerID="f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3" Jul 2 08:54:05.729644 env[1136]: time="2024-07-02T08:54:05.728542464Z" level=info msg="TearDown network for sandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" successfully" Jul 2 08:54:05.739261 env[1136]: time="2024-07-02T08:54:05.739221462Z" level=info msg="RemovePodSandbox \"f86c45d7ec5856256c3c551820edf0d9876b3c7e6941ec39cb0cf9235f6acdc3\" returns successfully" Jul 2 08:54:05.740053 env[1136]: time="2024-07-02T08:54:05.740029874Z" level=info msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.793 [WARNING][2808] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3042fba1-2739-40d5-ac5f-9bfb57e4acac", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39", Pod:"nginx-deployment-6d5f899847-cxc6p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4b83c1dbad9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.793 [INFO][2808] k8s.go 608: Cleaning up netns ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.793 [INFO][2808] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" iface="eth0" netns="" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.793 [INFO][2808] k8s.go 615: Releasing IP address(es) ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.793 [INFO][2808] utils.go 188: Calico CNI releasing IP address ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.832 [INFO][2814] ipam_plugin.go 411: Releasing address using handleID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.833 [INFO][2814] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.833 [INFO][2814] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.847 [WARNING][2814] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.847 [INFO][2814] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.851 [INFO][2814] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:05.854589 env[1136]: 2024-07-02 08:54:05.852 [INFO][2808] k8s.go 621: Teardown processing complete. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.855660 env[1136]: time="2024-07-02T08:54:05.854688245Z" level=info msg="TearDown network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" successfully" Jul 2 08:54:05.855660 env[1136]: time="2024-07-02T08:54:05.854752355Z" level=info msg="StopPodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" returns successfully" Jul 2 08:54:05.855660 env[1136]: time="2024-07-02T08:54:05.855399325Z" level=info msg="RemovePodSandbox for \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" Jul 2 08:54:05.855660 env[1136]: time="2024-07-02T08:54:05.855503279Z" level=info msg="Forcibly stopping sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\"" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.910 [WARNING][2835] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3042fba1-2739-40d5-ac5f-9bfb57e4acac", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"dd59eae61e448d4097d6f6faf1fd5b3e2c82af3ce3f5b9b5586d269d1f137c39", Pod:"nginx-deployment-6d5f899847-cxc6p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4b83c1dbad9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.910 [INFO][2835] k8s.go 608: Cleaning up netns ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.910 [INFO][2835] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" iface="eth0" netns="" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.910 [INFO][2835] k8s.go 615: Releasing IP address(es) ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.911 [INFO][2835] utils.go 188: Calico CNI releasing IP address ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.944 [INFO][2841] ipam_plugin.go 411: Releasing address using handleID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.944 [INFO][2841] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.944 [INFO][2841] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.958 [WARNING][2841] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.958 [INFO][2841] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" HandleID="k8s-pod-network.ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Workload="172.24.4.242-k8s-nginx--deployment--6d5f899847--cxc6p-eth0" Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.964 [INFO][2841] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:05.971590 env[1136]: 2024-07-02 08:54:05.968 [INFO][2835] k8s.go 621: Teardown processing complete. ContainerID="ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd" Jul 2 08:54:05.971590 env[1136]: time="2024-07-02T08:54:05.971379168Z" level=info msg="TearDown network for sandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" successfully" Jul 2 08:54:05.978037 env[1136]: time="2024-07-02T08:54:05.977951884Z" level=info msg="RemovePodSandbox \"ab2bf7e0ffc7ab5a90a96f4cff3cb4e86261f4893e138cb4150e2810ffdd25cd\" returns successfully" Jul 2 08:54:06.375358 kubelet[1462]: E0702 08:54:06.375305 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:06.647000 audit[2848]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.650544 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 08:54:06.650667 kernel: audit: type=1325 audit(1719910446.647:545): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.647000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc154526d0 a2=0 a3=7ffc154526bc items=0 ppid=1627 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.669895 kernel: audit: type=1300 audit(1719910446.647:545): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc154526d0 a2=0 a3=7ffc154526bc items=0 ppid=1627 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.670028 kernel: audit: type=1327 audit(1719910446.647:545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.650000 audit[2848]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.682360 kernel: audit: type=1325 audit(1719910446.650:546): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.682488 kernel: audit: type=1300 audit(1719910446.650:546): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc154526d0 a2=0 a3=0 items=0 ppid=1627 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.650000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc154526d0 a2=0 a3=0 items=0 ppid=1627 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.700446 kernel: audit: type=1327 audit(1719910446.650:546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.682000 audit[2852]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.682000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd47284240 a2=0 a3=7ffd4728422c items=0 ppid=1627 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.711025 kernel: audit: type=1325 audit(1719910446.682:547): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.711127 kernel: audit: type=1300 audit(1719910446.682:547): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd47284240 a2=0 a3=7ffd4728422c items=0 ppid=1627 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.711185 kernel: audit: type=1327 audit(1719910446.682:547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.702000 audit[2852]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.702000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd47284240 a2=0 a3=0 items=0 ppid=1627 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:06.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:06.719604 kernel: audit: type=1325 audit(1719910446.702:548): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:06.741281 kubelet[1462]: I0702 08:54:06.741223 1462 topology_manager.go:215] "Topology Admit Handler" podUID="61f398f2-16a9-4374-85de-4aaf8e660b18" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 08:54:06.752628 systemd[1]: Created slice kubepods-besteffort-pod61f398f2_16a9_4374_85de_4aaf8e660b18.slice. Jul 2 08:54:06.869762 kubelet[1462]: I0702 08:54:06.869681 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/61f398f2-16a9-4374-85de-4aaf8e660b18-data\") pod \"nfs-server-provisioner-0\" (UID: \"61f398f2-16a9-4374-85de-4aaf8e660b18\") " pod="default/nfs-server-provisioner-0" Jul 2 08:54:06.870196 kubelet[1462]: I0702 08:54:06.869802 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zxzx9\" (UniqueName: \"kubernetes.io/projected/61f398f2-16a9-4374-85de-4aaf8e660b18-kube-api-access-zxzx9\") pod \"nfs-server-provisioner-0\" (UID: \"61f398f2-16a9-4374-85de-4aaf8e660b18\") " pod="default/nfs-server-provisioner-0" Jul 2 08:54:07.059061 env[1136]: time="2024-07-02T08:54:07.058233625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:61f398f2-16a9-4374-85de-4aaf8e660b18,Namespace:default,Attempt:0,}" Jul 2 08:54:07.367363 systemd-networkd[971]: cali60e51b789ff: Link UP Jul 2 08:54:07.372401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:54:07.372587 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 08:54:07.374967 systemd-networkd[971]: cali60e51b789ff: Gained carrier Jul 2 08:54:07.376177 kubelet[1462]: E0702 08:54:07.375926 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.187 [INFO][2855] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.242-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 61f398f2-16a9-4374-85de-4aaf8e660b18 1223 0 2024-07-02 08:54:06 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.242 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.187 [INFO][2855] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.258 [INFO][2865] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" HandleID="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Workload="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.288 [INFO][2865] ipam_plugin.go 264: Auto assigning IP ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" HandleID="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Workload="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aad0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.242", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 08:54:07.258220772 +0000 UTC"}, Hostname:"172.24.4.242", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.288 [INFO][2865] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.288 [INFO][2865] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.289 [INFO][2865] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.242' Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.293 [INFO][2865] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.303 [INFO][2865] ipam.go 372: Looking up existing affinities for host host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.315 [INFO][2865] ipam.go 489: Trying affinity for 192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.320 [INFO][2865] ipam.go 155: Attempting to load block cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.325 [INFO][2865] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.326 [INFO][2865] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.330 [INFO][2865] ipam.go 1685: Creating new handle: k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945 Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.338 [INFO][2865] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.351 [INFO][2865] ipam.go 1216: Successfully claimed IPs: [192.168.76.3/26] block=192.168.76.0/26 handle="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.351 [INFO][2865] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.3/26] handle="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" host="172.24.4.242" Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.351 [INFO][2865] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:07.407552 env[1136]: 2024-07-02 08:54:07.351 [INFO][2865] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.76.3/26] IPv6=[] ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" HandleID="k8s-pod-network.3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Workload="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.412251 env[1136]: 2024-07-02 08:54:07.355 [INFO][2855] k8s.go 386: Populated endpoint ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"61f398f2-16a9-4374-85de-4aaf8e660b18", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 54, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:07.412251 env[1136]: 2024-07-02 08:54:07.356 [INFO][2855] k8s.go 387: Calico CNI using IPs: [192.168.76.3/32] ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.412251 env[1136]: 2024-07-02 08:54:07.356 [INFO][2855] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.412251 env[1136]: 2024-07-02 08:54:07.374 [INFO][2855] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.412915 env[1136]: 2024-07-02 08:54:07.381 [INFO][2855] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"61f398f2-16a9-4374-85de-4aaf8e660b18", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 54, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6e:d2:00:bf:dc:35", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:07.412915 env[1136]: 2024-07-02 08:54:07.404 [INFO][2855] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.242-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:54:07.441864 env[1136]: time="2024-07-02T08:54:07.441676218Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:54:07.441864 env[1136]: time="2024-07-02T08:54:07.441721212Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:54:07.441864 env[1136]: time="2024-07-02T08:54:07.441736451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:54:07.442195 env[1136]: time="2024-07-02T08:54:07.442119047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945 pid=2893 runtime=io.containerd.runc.v2 Jul 2 08:54:07.450000 audit[2904]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:54:07.450000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffead911820 a2=0 a3=7ffead91180c items=0 ppid=2193 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.450000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:54:07.464348 systemd[1]: Started cri-containerd-3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945.scope. Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.484000 audit: BPF prog-id=100 op=LOAD Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623832353566636465373636653562383932353865633566646366 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623832353566636465373636653562383932353865633566646366 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit: BPF prog-id=101 op=LOAD Jul 2 08:54:07.485000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ac610 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623832353566636465373636653562383932353865633566646366 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit: BPF prog-id=102 op=LOAD Jul 2 08:54:07.485000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000ac658 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623832353566636465373636653562383932353865633566646366 Jul 2 08:54:07.485000 audit: BPF prog-id=102 op=UNLOAD Jul 2 08:54:07.485000 audit: BPF prog-id=101 op=UNLOAD Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:07.485000 audit: BPF prog-id=103 op=LOAD Jul 2 08:54:07.485000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000aca68 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:07.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623832353566636465373636653562383932353865633566646366 Jul 2 08:54:07.519623 env[1136]: time="2024-07-02T08:54:07.519582687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:61f398f2-16a9-4374-85de-4aaf8e660b18,Namespace:default,Attempt:0,} returns sandbox id \"3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945\"" Jul 2 08:54:07.522066 env[1136]: time="2024-07-02T08:54:07.522023564Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 08:54:08.376709 kubelet[1462]: E0702 08:54:08.376630 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:09.378784 systemd-networkd[971]: cali60e51b789ff: Gained IPv6LL Jul 2 08:54:09.385948 kubelet[1462]: E0702 08:54:09.385886 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:10.387159 kubelet[1462]: E0702 08:54:10.387100 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:11.389135 kubelet[1462]: E0702 08:54:11.389033 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:11.494986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3943122119.mount: Deactivated successfully. Jul 2 08:54:12.390347 kubelet[1462]: E0702 08:54:12.390263 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:13.390762 kubelet[1462]: E0702 08:54:13.390688 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:14.391547 kubelet[1462]: E0702 08:54:14.391420 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:15.392418 kubelet[1462]: E0702 08:54:15.392137 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:15.480260 env[1136]: time="2024-07-02T08:54:15.480117865Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:15.484059 env[1136]: time="2024-07-02T08:54:15.483998259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:15.487810 env[1136]: time="2024-07-02T08:54:15.487723842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:15.491881 env[1136]: time="2024-07-02T08:54:15.491811935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:15.493891 env[1136]: time="2024-07-02T08:54:15.493829201Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 08:54:15.499923 env[1136]: time="2024-07-02T08:54:15.499849139Z" level=info msg="CreateContainer within sandbox \"3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 08:54:15.534427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4090365335.mount: Deactivated successfully. Jul 2 08:54:15.542176 env[1136]: time="2024-07-02T08:54:15.542096950Z" level=info msg="CreateContainer within sandbox \"3eb8255fcde766e5b89258ec5fdcf45fcec46a642b24fc140239f0a259e93945\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1d7c1478bde832a69674bbfc1ef81b6adade299f1a18c94b89166ac576947212\"" Jul 2 08:54:15.543301 env[1136]: time="2024-07-02T08:54:15.543238276Z" level=info msg="StartContainer for \"1d7c1478bde832a69674bbfc1ef81b6adade299f1a18c94b89166ac576947212\"" Jul 2 08:54:15.586671 systemd[1]: Started cri-containerd-1d7c1478bde832a69674bbfc1ef81b6adade299f1a18c94b89166ac576947212.scope. Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.608336 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 08:54:15.608397 kernel: audit: type=1400 audit(1719910455.606:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.614299 kernel: audit: type=1400 audit(1719910455.606:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618894 kernel: audit: type=1400 audit(1719910455.606:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618964 kernel: audit: type=1400 audit(1719910455.606:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.627615 kernel: audit: type=1400 audit(1719910455.606:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.627681 kernel: audit: type=1400 audit(1719910455.606:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.627709 kernel: audit: type=1400 audit(1719910455.606:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.634480 kernel: audit: type=1400 audit(1719910455.606:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.634556 kernel: audit: type=1400 audit(1719910455.606:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.641223 kernel: audit: type=1400 audit(1719910455.606:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.606000 audit: BPF prog-id=104 op=LOAD Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:15.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376331343738626465383332613639363734626266633165663831 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:15.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376331343738626465383332613639363734626266633165663831 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.611000 audit: BPF prog-id=105 op=LOAD Jul 2 08:54:15.611000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2250 items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:15.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376331343738626465383332613639363734626266633165663831 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.618000 audit: BPF prog-id=106 op=LOAD Jul 2 08:54:15.618000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2298 items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:15.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376331343738626465383332613639363734626266633165663831 Jul 2 08:54:15.620000 audit: BPF prog-id=106 op=UNLOAD Jul 2 08:54:15.620000 audit: BPF prog-id=105 op=UNLOAD Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:15.620000 audit: BPF prog-id=107 op=LOAD Jul 2 08:54:15.620000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c26a8 items=0 ppid=2893 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:15.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376331343738626465383332613639363734626266633165663831 Jul 2 08:54:15.677452 env[1136]: time="2024-07-02T08:54:15.677379686Z" level=info msg="StartContainer for \"1d7c1478bde832a69674bbfc1ef81b6adade299f1a18c94b89166ac576947212\" returns successfully" Jul 2 08:54:15.734000 audit[2975]: AVC avc: denied { search } for pid=2975 comm="rpcbind" name="crypto" dev="proc" ino=22233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 08:54:15.734000 audit[2975]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc2511430c0 a2=0 a3=0 items=0 ppid=2957 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 key=(null) Jul 2 08:54:15.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 08:54:15.847000 audit[2980]: AVC avc: denied { search } for pid=2980 comm="dbus-daemon" name="crypto" dev="proc" ino=22233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 08:54:15.847000 audit[2980]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcccfbe80c0 a2=0 a3=0 items=0 ppid=2957 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 key=(null) Jul 2 08:54:15.847000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 08:54:15.859000 audit[2981]: AVC avc: denied { watch } for pid=2981 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537666 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c110,c292 tclass=dir permissive=0 Jul 2 08:54:15.859000 audit[2981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5583b9cab590 a2=2c8 a3=7fff924cf1fc items=0 ppid=2957 pid=2981 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 key=(null) Jul 2 08:54:15.859000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 08:54:15.869000 audit[2982]: AVC avc: denied { read } for pid=2982 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23089 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 08:54:15.869000 audit[2982]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fabca6bd320 a1=80000 a2=d a3=7ffd454666c0 items=0 ppid=2957 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 key=(null) Jul 2 08:54:15.869000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 08:54:15.871000 audit[2982]: AVC avc: denied { search } for pid=2982 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 08:54:15.871000 audit[2982]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fabc9c110c0 a2=0 a3=0 items=0 ppid=2957 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c292 key=(null) Jul 2 08:54:15.871000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 08:54:15.915082 kubelet[1462]: I0702 08:54:15.914800 1462 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.9413645800000001 podCreationTimestamp="2024-07-02 08:54:06 +0000 UTC" firstStartedPulling="2024-07-02 08:54:07.521266056 +0000 UTC m=+62.972311463" lastFinishedPulling="2024-07-02 08:54:15.494647372 +0000 UTC m=+70.945692829" observedRunningTime="2024-07-02 08:54:15.91287317 +0000 UTC m=+71.363918626" watchObservedRunningTime="2024-07-02 08:54:15.914745946 +0000 UTC m=+71.365791352" Jul 2 08:54:16.015000 audit[2987]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:16.015000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff3fc63b60 a2=0 a3=7fff3fc63b4c items=0 ppid=1627 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:16.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:16.021000 audit[2987]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:54:16.021000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff3fc63b60 a2=0 a3=7fff3fc63b4c items=0 ppid=1627 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:16.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:54:16.392758 kubelet[1462]: E0702 08:54:16.392690 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:17.394258 kubelet[1462]: E0702 08:54:17.394161 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:18.394947 kubelet[1462]: E0702 08:54:18.394865 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:19.396092 kubelet[1462]: E0702 08:54:19.396034 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:20.397881 kubelet[1462]: E0702 08:54:20.397835 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:21.398902 kubelet[1462]: E0702 08:54:21.398839 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:22.400082 kubelet[1462]: E0702 08:54:22.400033 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:23.401322 kubelet[1462]: E0702 08:54:23.401254 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:24.402673 kubelet[1462]: E0702 08:54:24.402602 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:25.317167 kubelet[1462]: E0702 08:54:25.317099 1462 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:25.403768 kubelet[1462]: E0702 08:54:25.403666 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:26.405194 kubelet[1462]: E0702 08:54:26.405046 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:27.405641 kubelet[1462]: E0702 08:54:27.405571 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:28.406707 kubelet[1462]: E0702 08:54:28.406640 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:29.407975 kubelet[1462]: E0702 08:54:29.407888 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:30.408747 kubelet[1462]: E0702 08:54:30.408686 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:31.409793 kubelet[1462]: E0702 08:54:31.409738 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:32.410929 kubelet[1462]: E0702 08:54:32.410858 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:33.412519 kubelet[1462]: E0702 08:54:33.412410 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:34.413968 kubelet[1462]: E0702 08:54:34.413903 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:35.415377 kubelet[1462]: E0702 08:54:35.415214 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:36.415787 kubelet[1462]: E0702 08:54:36.415684 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:37.416444 kubelet[1462]: E0702 08:54:37.416383 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:38.417217 kubelet[1462]: E0702 08:54:38.417114 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:39.417813 kubelet[1462]: E0702 08:54:39.417680 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:40.419013 kubelet[1462]: E0702 08:54:40.418890 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:40.782130 kubelet[1462]: I0702 08:54:40.782088 1462 topology_manager.go:215] "Topology Admit Handler" podUID="46cec6e4-6732-42dd-af1f-ef074916a735" podNamespace="default" podName="test-pod-1" Jul 2 08:54:40.789918 systemd[1]: Created slice kubepods-besteffort-pod46cec6e4_6732_42dd_af1f_ef074916a735.slice. Jul 2 08:54:40.940611 kubelet[1462]: I0702 08:54:40.940555 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-dd34df73-1121-49f4-b51c-6e6c76e59415\" (UniqueName: \"kubernetes.io/nfs/46cec6e4-6732-42dd-af1f-ef074916a735-pvc-dd34df73-1121-49f4-b51c-6e6c76e59415\") pod \"test-pod-1\" (UID: \"46cec6e4-6732-42dd-af1f-ef074916a735\") " pod="default/test-pod-1" Jul 2 08:54:40.940933 kubelet[1462]: I0702 08:54:40.940893 1462 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjd56\" (UniqueName: \"kubernetes.io/projected/46cec6e4-6732-42dd-af1f-ef074916a735-kube-api-access-wjd56\") pod \"test-pod-1\" (UID: \"46cec6e4-6732-42dd-af1f-ef074916a735\") " pod="default/test-pod-1" Jul 2 08:54:41.100000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.118902 kernel: Failed to create system directory netfs Jul 2 08:54:41.119048 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 08:54:41.119105 kernel: audit: type=1400 audit(1719910481.100:593): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.119162 kernel: Failed to create system directory netfs Jul 2 08:54:41.119206 kernel: audit: type=1400 audit(1719910481.100:593): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.100000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.130089 kernel: Failed to create system directory netfs Jul 2 08:54:41.130198 kernel: audit: type=1400 audit(1719910481.100:593): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.100000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.140976 kernel: Failed to create system directory netfs Jul 2 08:54:41.141083 kernel: audit: type=1400 audit(1719910481.100:593): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.100000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.100000 audit[3050]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5600c57575e0 a1=153bc a2=5600c4e272b0 a3=5 items=0 ppid=50 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.171497 kernel: audit: type=1300 audit(1719910481.100:593): arch=c000003e syscall=175 success=yes exit=0 a0=5600c57575e0 a1=153bc a2=5600c4e272b0 a3=5 items=0 ppid=50 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.100000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 08:54:41.176522 kernel: audit: type=1327 audit(1719910481.100:593): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 08:54:41.184495 kernel: Failed to create system directory fscache Jul 2 08:54:41.184720 kernel: audit: type=1400 audit(1719910481.178:594): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.189399 kernel: Failed to create system directory fscache Jul 2 08:54:41.189558 kernel: Failed to create system directory fscache Jul 2 08:54:41.199558 kernel: audit: type=1400 audit(1719910481.178:594): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.199687 kernel: Failed to create system directory fscache Jul 2 08:54:41.199743 kernel: Failed to create system directory fscache Jul 2 08:54:41.199789 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.202611 kernel: audit: type=1400 audit(1719910481.178:594): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.202728 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.212631 kernel: audit: type=1400 audit(1719910481.178:594): avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.212764 kernel: Failed to create system directory fscache Jul 2 08:54:41.212820 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.224182 kernel: Failed to create system directory fscache Jul 2 08:54:41.224340 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.225160 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.226137 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.227172 kernel: Failed to create system directory fscache Jul 2 08:54:41.178000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.231529 kernel: FS-Cache: Loaded Jul 2 08:54:41.178000 audit[3050]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5600c596c9c0 a1=4c0fc a2=5600c4e272b0 a3=5 items=0 ppid=50 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.178000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.277632 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.279739 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.279782 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.280823 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.281877 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.282927 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.283995 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.285068 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.286115 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.287122 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.288174 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.289240 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.290291 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.291357 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.292408 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.294526 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.294567 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.295633 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.296691 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.297666 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.298644 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.299643 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.300698 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.301742 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.302718 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.303725 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.304798 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.305850 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.306883 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.307888 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.308949 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.310013 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.311072 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.312146 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.313268 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.314402 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.316552 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.316594 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.317625 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.318679 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.319681 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.320751 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.321791 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.322833 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.324465 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.326766 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.326846 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.326897 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.328643 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.328756 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.329661 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.330628 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.331609 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.332571 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.333545 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.335436 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.335586 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.337393 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.337514 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.338359 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.339328 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.341281 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.341375 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.342216 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.343148 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.344133 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.345096 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.346033 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.346928 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.348870 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.348956 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.349801 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.350762 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.351745 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.352716 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.353712 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.354542 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.356492 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.356584 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.357346 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.358248 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.360089 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.360175 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.361051 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.362022 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.362989 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.363964 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.364954 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.365966 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.366977 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.367996 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.368985 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.376956 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377073 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377127 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377177 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377221 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377266 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377309 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.377347 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.378138 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.379025 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.380052 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.381076 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.382084 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.383126 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.384228 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.386250 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.386358 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.388273 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.388398 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.389367 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.391399 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.391586 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.392541 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.395770 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.395893 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.396034 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.397893 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.398039 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.399929 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.400068 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.400940 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.401951 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.402952 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.403911 kernel: Failed to create system directory sunrpc Jul 2 08:54:41.257000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.419222 kernel: RPC: Registered named UNIX socket transport module. Jul 2 08:54:41.419409 kernel: RPC: Registered udp transport module. Jul 2 08:54:41.419547 kernel: RPC: Registered tcp transport module. Jul 2 08:54:41.419611 kubelet[1462]: E0702 08:54:41.419072 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:41.420405 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 08:54:41.257000 audit[3050]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5600c59b8ad0 a1=1a7f5c a2=5600c4e272b0 a3=5 items=6 ppid=50 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.257000 audit: CWD cwd="/" Jul 2 08:54:41.257000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PATH item=1 name=(null) inode=22440 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PATH item=2 name=(null) inode=22440 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PATH item=3 name=(null) inode=22441 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PATH item=4 name=(null) inode=22440 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PATH item=5 name=(null) inode=22442 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:54:41.257000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.477279 kernel: Failed to create system directory nfs Jul 2 08:54:41.477437 kernel: Failed to create system directory nfs Jul 2 08:54:41.477531 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.478180 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.479126 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.480055 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.480982 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.481873 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.482748 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.483635 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.485533 kernel: Failed to create system directory nfs Jul 2 08:54:41.485670 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.486407 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.487307 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.488250 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.489158 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.490121 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.490994 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.491899 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.492832 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.493727 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.494608 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.496523 kernel: Failed to create system directory nfs Jul 2 08:54:41.496666 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.497427 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.498386 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.499326 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.500273 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.501210 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.502166 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.503052 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.503952 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.505015 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.506970 kernel: Failed to create system directory nfs Jul 2 08:54:41.507111 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.507865 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.508744 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.509626 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.511369 kernel: Failed to create system directory nfs Jul 2 08:54:41.511547 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.512316 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.513255 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.514138 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.515017 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.515973 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.520653 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.521616 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.523694 kernel: Failed to create system directory nfs Jul 2 08:54:41.523841 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.524556 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.525439 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.526384 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.527283 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.528264 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.529166 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.530129 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.531077 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.532029 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.532971 kernel: Failed to create system directory nfs Jul 2 08:54:41.462000 audit[3050]: AVC avc: denied { confidentiality } for pid=3050 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.462000 audit[3050]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5600c5bd9790 a1=16dba4 a2=5600c4e272b0 a3=5 items=0 ppid=50 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.561113 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 08:54:41.462000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.614784 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.614916 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.614971 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.615713 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.616679 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.620764 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.620896 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.620951 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.620992 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.623545 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.623635 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.623965 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.624832 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.625884 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.626802 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.627694 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634456 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634779 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634847 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634896 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634935 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.634973 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.635017 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.636745 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.636821 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.638448 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.638581 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.639423 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.640424 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.641414 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.642416 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.644371 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.644549 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.646334 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.646511 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.649025 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.649231 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.649300 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.650197 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.652205 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.652422 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.653164 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.654104 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.655148 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.656044 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.657002 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.657923 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.658838 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.659897 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.660764 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.661705 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.662614 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.664507 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.664584 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.665415 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.666391 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.667268 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.668206 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.669170 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.670141 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.671074 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.672039 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.673010 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.673932 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.674776 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.675824 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.676782 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.677809 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.678803 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.679814 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.680792 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.681756 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.682730 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.683644 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.684616 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.686534 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.686656 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.687424 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.688396 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.689368 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.690334 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.691233 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.692160 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.693123 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.694094 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.695052 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.696010 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.696953 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.697885 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.698781 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.699716 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.700688 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.701644 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.593000 audit[3055]: AVC avc: denied { confidentiality } for pid=3055 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.706969 kernel: Failed to create system directory nfs4 Jul 2 08:54:41.879025 kernel: NFS: Registering the id_resolver key type Jul 2 08:54:41.879267 kernel: Key type id_resolver registered Jul 2 08:54:41.879330 kernel: Key type id_legacy registered Jul 2 08:54:41.593000 audit[3055]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb612184010 a1=20890c a2=5638dce012b0 a3=5 items=0 ppid=50 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.593000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.903705 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.903880 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.903935 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905366 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905427 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905507 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905567 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905623 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.905670 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.907265 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.907384 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.908197 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.909202 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.910175 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.911127 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.912074 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.913060 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.913999 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.914977 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.915983 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.916973 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.917892 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.918825 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.919837 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.922164 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.922293 kernel: Failed to create system directory rpcgss Jul 2 08:54:41.891000 audit[3057]: AVC avc: denied { confidentiality } for pid=3057 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 08:54:41.891000 audit[3057]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd9b93e7010 a1=70bec a2=56073f59b2b0 a3=5 items=0 ppid=50 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.891000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 08:54:41.976323 nfsidmap[3063]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Jul 2 08:54:41.983989 nfsidmap[3064]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Jul 2 08:54:41.996000 audit[1222]: AVC avc: denied { watch_reads } for pid=1222 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:41.996000 audit[1222]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560210025560 a2=10 a3=5fb3ca18aebbc75d items=0 ppid=1 pid=1222 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.996000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 08:54:41.996000 audit[1222]: AVC avc: denied { watch_reads } for pid=1222 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:41.996000 audit[1222]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560210025560 a2=10 a3=5fb3ca18aebbc75d items=0 ppid=1 pid=1222 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.996000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 08:54:41.996000 audit[1222]: AVC avc: denied { watch_reads } for pid=1222 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:41.996000 audit[1222]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560210025560 a2=10 a3=5fb3ca18aebbc75d items=0 ppid=1 pid=1222 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:41.996000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 08:54:41.997000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:41.997000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:41.997000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 08:54:42.296520 env[1136]: time="2024-07-02T08:54:42.296386905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:46cec6e4-6732-42dd-af1f-ef074916a735,Namespace:default,Attempt:0,}" Jul 2 08:54:42.420148 kubelet[1462]: E0702 08:54:42.420038 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:42.580822 systemd-networkd[971]: cali5ec59c6bf6e: Link UP Jul 2 08:54:42.589658 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:54:42.589819 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 08:54:42.590687 systemd-networkd[971]: cali5ec59c6bf6e: Gained carrier Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.412 [INFO][3070] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.242-k8s-test--pod--1-eth0 default 46cec6e4-6732-42dd-af1f-ef074916a735 1325 0 2024-07-02 08:54:10 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.242 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.412 [INFO][3070] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.469 [INFO][3082] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" HandleID="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Workload="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.493 [INFO][3082] ipam_plugin.go 264: Auto assigning IP ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" HandleID="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Workload="172.24.4.242-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ef4e0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.242", "pod":"test-pod-1", "timestamp":"2024-07-02 08:54:42.469761497 +0000 UTC"}, Hostname:"172.24.4.242", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.494 [INFO][3082] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.494 [INFO][3082] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.494 [INFO][3082] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.242' Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.499 [INFO][3082] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.508 [INFO][3082] ipam.go 372: Looking up existing affinities for host host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.518 [INFO][3082] ipam.go 489: Trying affinity for 192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.523 [INFO][3082] ipam.go 155: Attempting to load block cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.529 [INFO][3082] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.529 [INFO][3082] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.534 [INFO][3082] ipam.go 1685: Creating new handle: k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048 Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.545 [INFO][3082] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.563 [INFO][3082] ipam.go 1216: Successfully claimed IPs: [192.168.76.4/26] block=192.168.76.0/26 handle="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.563 [INFO][3082] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.4/26] handle="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" host="172.24.4.242" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.563 [INFO][3082] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.563 [INFO][3082] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.76.4/26] IPv6=[] ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" HandleID="k8s-pod-network.7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Workload="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.567 [INFO][3070] k8s.go 386: Populated endpoint ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"46cec6e4-6732-42dd-af1f-ef074916a735", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:42.612164 env[1136]: 2024-07-02 08:54:42.568 [INFO][3070] k8s.go 387: Calico CNI using IPs: [192.168.76.4/32] ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.614399 env[1136]: 2024-07-02 08:54:42.569 [INFO][3070] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.614399 env[1136]: 2024-07-02 08:54:42.591 [INFO][3070] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.614399 env[1136]: 2024-07-02 08:54:42.592 [INFO][3070] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.242-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"46cec6e4-6732-42dd-af1f-ef074916a735", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 54, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.242", ContainerID:"7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a2:8c:c6:cb:28:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:54:42.614399 env[1136]: 2024-07-02 08:54:42.605 [INFO][3070] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.242-k8s-test--pod--1-eth0" Jul 2 08:54:42.648000 audit[3106]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:54:42.648000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc57c1b5f0 a2=0 a3=7ffc57c1b5dc items=0 ppid=2193 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:54:42.653431 env[1136]: time="2024-07-02T08:54:42.653207867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:54:42.653796 env[1136]: time="2024-07-02T08:54:42.653725366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:54:42.654063 env[1136]: time="2024-07-02T08:54:42.653972590Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:54:42.655285 env[1136]: time="2024-07-02T08:54:42.655123787Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048 pid=3109 runtime=io.containerd.runc.v2 Jul 2 08:54:42.687417 systemd[1]: Started cri-containerd-7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048.scope. Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.700000 audit: BPF prog-id=108 op=LOAD Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3109 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343761633033393766643563316430383961313063326136653231 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3109 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343761633033393766643563316430383961313063326136653231 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.701000 audit: BPF prog-id=109 op=LOAD Jul 2 08:54:42.701000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009f250 items=0 ppid=3109 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343761633033393766643563316430383961313063326136653231 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.702000 audit: BPF prog-id=110 op=LOAD Jul 2 08:54:42.702000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009f298 items=0 ppid=3109 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343761633033393766643563316430383961313063326136653231 Jul 2 08:54:42.703000 audit: BPF prog-id=110 op=UNLOAD Jul 2 08:54:42.703000 audit: BPF prog-id=109 op=UNLOAD Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:42.703000 audit: BPF prog-id=111 op=LOAD Jul 2 08:54:42.703000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009f6a8 items=0 ppid=3109 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:42.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343761633033393766643563316430383961313063326136653231 Jul 2 08:54:42.735954 env[1136]: time="2024-07-02T08:54:42.735868198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:46cec6e4-6732-42dd-af1f-ef074916a735,Namespace:default,Attempt:0,} returns sandbox id \"7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048\"" Jul 2 08:54:42.738238 env[1136]: time="2024-07-02T08:54:42.738207832Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 08:54:43.286658 env[1136]: time="2024-07-02T08:54:43.286549274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:43.289289 env[1136]: time="2024-07-02T08:54:43.289201623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:43.293954 env[1136]: time="2024-07-02T08:54:43.293886170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:43.298883 env[1136]: time="2024-07-02T08:54:43.298806619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:54:43.301777 env[1136]: time="2024-07-02T08:54:43.301693869Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 08:54:43.309269 env[1136]: time="2024-07-02T08:54:43.309199561Z" level=info msg="CreateContainer within sandbox \"7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 08:54:43.344097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount433644165.mount: Deactivated successfully. Jul 2 08:54:43.355687 env[1136]: time="2024-07-02T08:54:43.355601101Z" level=info msg="CreateContainer within sandbox \"7c47ac0397fd5c1d089a10c2a6e213aeebc5c3563bb4dc2d008a58cc757f5048\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"84388e2ac6235cd5a52000799c2a8928098253d4c6f0da3105c0de47fae81a25\"" Jul 2 08:54:43.358134 env[1136]: time="2024-07-02T08:54:43.358037916Z" level=info msg="StartContainer for \"84388e2ac6235cd5a52000799c2a8928098253d4c6f0da3105c0de47fae81a25\"" Jul 2 08:54:43.399814 systemd[1]: Started cri-containerd-84388e2ac6235cd5a52000799c2a8928098253d4c6f0da3105c0de47fae81a25.scope. Jul 2 08:54:43.426473 kubelet[1462]: E0702 08:54:43.421200 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.436000 audit: BPF prog-id=112 op=LOAD Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3109 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:43.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333838653261633632333563643561353230303037393963326138 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3109 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:43.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333838653261633632333563643561353230303037393963326138 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.437000 audit: BPF prog-id=113 op=LOAD Jul 2 08:54:43.437000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024f60 items=0 ppid=3109 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:43.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333838653261633632333563643561353230303037393963326138 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.438000 audit: BPF prog-id=114 op=LOAD Jul 2 08:54:43.438000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024fa8 items=0 ppid=3109 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:43.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333838653261633632333563643561353230303037393963326138 Jul 2 08:54:43.439000 audit: BPF prog-id=114 op=UNLOAD Jul 2 08:54:43.439000 audit: BPF prog-id=113 op=UNLOAD Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:54:43.439000 audit: BPF prog-id=115 op=LOAD Jul 2 08:54:43.439000 audit[3154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000253b8 items=0 ppid=3109 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:54:43.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333838653261633632333563643561353230303037393963326138 Jul 2 08:54:43.463057 env[1136]: time="2024-07-02T08:54:43.463017899Z" level=info msg="StartContainer for \"84388e2ac6235cd5a52000799c2a8928098253d4c6f0da3105c0de47fae81a25\" returns successfully" Jul 2 08:54:44.385576 systemd-networkd[971]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 08:54:44.422492 kubelet[1462]: E0702 08:54:44.422327 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:45.316762 kubelet[1462]: E0702 08:54:45.316618 1462 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:45.422846 kubelet[1462]: E0702 08:54:45.422753 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:46.422983 kubelet[1462]: E0702 08:54:46.422906 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:47.423208 kubelet[1462]: E0702 08:54:47.423120 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:48.424130 kubelet[1462]: E0702 08:54:48.424064 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:49.425638 kubelet[1462]: E0702 08:54:49.425552 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:50.171941 systemd[1]: run-containerd-runc-k8s.io-9ba9d1569be1548a7503075493b99eb6ce5f501c23222b1b470df07ee2d604a4-runc.5o0PWe.mount: Deactivated successfully. Jul 2 08:54:50.426520 kubelet[1462]: E0702 08:54:50.426217 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:51.427057 kubelet[1462]: E0702 08:54:51.426923 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:52.427756 kubelet[1462]: E0702 08:54:52.427677 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:53.428123 kubelet[1462]: E0702 08:54:53.428051 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:54:54.429242 kubelet[1462]: E0702 08:54:54.429186 1462 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"